8.2 High
AI Score
Confidence
High
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.001 Low
EPSS
Percentile
43.1%
Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an “Off-by-two” or “Out of bounds overwrite” memory error.
hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html
lists.fedoraproject.org/pipermail/package-announce/2015-December/173703.html
lists.fedoraproject.org/pipermail/package-announce/2015-December/174049.html
lists.opensuse.org/opensuse-security-announce/2015-12/msg00037.html
lists.opensuse.org/opensuse-security-announce/2015-12/msg00039.html
lists.opensuse.org/opensuse-security-announce/2015-12/msg00040.html
lists.opensuse.org/opensuse-security-announce/2015-12/msg00041.html
lists.opensuse.org/opensuse-security-announce/2015-12/msg00043.html
lists.opensuse.org/opensuse-security-announce/2015-12/msg00044.html
lists.opensuse.org/opensuse-security-announce/2016-01/msg00003.html
packetstormsecurity.com/files/134831/Grub2-Authentication-Bypass.html
rhn.redhat.com/errata/RHSA-2015-2623.html
seclists.org/fulldisclosure/2015/Dec/69
www.debian.org/security/2015/dsa-3421
www.openwall.com/lists/oss-security/2015/12/15/6
www.openwall.com/lists/oss-security/2024/01/15/3
www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
www.securityfocus.com/archive/1/537115/100/0/threaded
www.securityfocus.com/bid/79358
www.securitytracker.com/id/1034422
www.ubuntu.com/usn/USN-2836-1
security.gentoo.org/glsa/201512-03