Lucene search

K
cvelistCanonicalCVELIST:CVE-2022-28733
HistoryJul 20, 2023 - 12:20 a.m.

CVE-2022-28733 Integer underflow in grub_net_recv_ip4_packets

2023-07-2000:20:02
CWE-191
canonical
www.cve.org
integer underflow
grub_net_recv_ip4_packets
buffer overflow
memory allocation
ip packet
cve-2022-28733

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

27.3%

Integer underflow in grub_net_recv_ip4_packets; A malicious crafted IP packet can lead to an integer underflow in grub_net_recv_ip4_packets() function on rsm->total_len value. Under certain circumstances the total_len value may end up wrapping around to a small integer number which will be used in memory allocation. If the attack succeeds in such way, subsequent operations can write past the end of the buffer.

CNA Affected

[
  {
    "packageName": "grub2",
    "product": "GNU GRUB",
    "vendor": "GNU Project",
    "repo": "https://git.savannah.gnu.org/cgit/grub.git",
    "platforms": [
      "Linux"
    ],
    "versions": [
      {
        "lessThan": "2.06-3",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

27.3%