2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2015-8370" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2015-12-16T21:59:04.063" ,
2024-01-16 03:00:29 +00:00
"lastModified" : "2024-01-16T01:15:33.947" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an \"Off-by-two\" or \"Out of bounds overwrite\" memory error."
} ,
{
"lang" : "es" ,
"value" : "M\u00faltiple desbordamiento inferior de entero en Grub2 1.98 hasta la versi\u00f3n 2.02 permite a atacantes f\u00edsicamente pr\u00f3ximos eludir la autenticaci\u00f3n, obtener informaci\u00f3n sensible o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de disco) a trav\u00e9s del car\u00e1cter backspace en la funci\u00f3n (1) grub_username_get en grub-core/normal/auth.c o (2) grub_password_get en lib/crypto.c, lo que desencadena un error de memoria 'Off-by-two' o 'Out of bounds overwrite'."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:M/Au:N/C:C/I:C/A:C" ,
"accessVector" : "LOCAL" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
"availabilityImpact" : "COMPLETE" ,
"baseScore" : 6.9
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 3.4 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-264"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:grub2:1.98:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "936B2F89-3A97-46A8-B776-CF605C192CA2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:grub2:1.99:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6FB62F6A-8B42-4186-99AF-2A07050EB19E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:grub2:2.00:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D3AB3BF3-95F2-43C6-8445-4B749135BE8E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:grub2:2.01:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F3C7F246-9B64-49C4-B358-C5A62C3A2458"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:grub2:2.02:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7AEB4A3C-A448-4C7D-8F08-57940E13BB6D"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E79AB8DD-C907-4038-A931-1A5A4CFB6A5B"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173703.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174049.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00037.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00039.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00040.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00041.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00043.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00044.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00003.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://packetstormsecurity.com/files/134831/Grub2-Authentication-Bypass.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2623.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://seclists.org/fulldisclosure/2015/Dec/69" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.debian.org/security/2015/dsa-3421" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2015/12/15/6" ,
"source" : "cve@mitre.org"
} ,
2024-01-16 03:00:29 +00:00
{
"url" : "http://www.openwall.com/lists/oss-security/2024/01/15/3" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/537115/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/79358" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securitytracker.com/id/1034422" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.ubuntu.com/usn/USN-2836-1" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://security.gentoo.org/glsa/201512-03" ,
"source" : "cve@mitre.org"
}
]
}