Lucene search

K
cveCanonicalCVE-2022-28736
HistoryJul 20, 2023 - 1:15 a.m.

CVE-2022-28736

2023-07-2001:15:10
CWE-416
canonical
web.nvd.nist.gov
1677
cve-2022-28736
grub2
use-after-free
vulnerability
memory allocation
arbitrary code execution
nvd

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

High

EPSS

0

Percentile

9.8%

There’s a use-after-free vulnerability in grub_cmd_chainloader() function; The chainloader command is used to boot up operating systems that doesn’t support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2’s memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved.

Affected configurations

Nvd
Node
gnugrub2Range2.002.06-3
VendorProductVersionCPE
gnugrub2*cpe:2.3:a:gnu:grub2:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "packageName": "grub2",
    "product": "GNU GRUB",
    "vendor": "GNU Project",
    "repo": "https://git.savannah.gnu.org/cgit/grub.git",
    "platforms": [
      "Linux"
    ],
    "versions": [
      {
        "lessThan": "2.06-3",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

High

EPSS

0

Percentile

9.8%