### [CVE-2015-8370](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8370) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error. ### POC #### Reference - http://hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html - http://packetstormsecurity.com/files/134831/Grub2-Authentication-Bypass.html - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html #### Github - https://github.com/integeruser/on-pwning