Lucene search

K
gentooGentoo FoundationGLSA-201512-03
HistoryDec 19, 2015 - 12:00 a.m.

GRUB: Authentication bypass

2015-12-1900:00:00
Gentoo Foundation
security.gentoo.org
17

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

43.0%

Background

GNU GRUB is a multiboot boot loader used by most Linux systems.

Description

An integer underflow in GRUB’s username/password authentication code has been discovered.

Impact

An attacker with access to the system console may bypass the username prompt by entering a sequence of backspace characters, allowing them e.g. to get full access to GRUB’s console or to load a customized kernel.

Workaround

There is no known workaround at this time.

Resolution

All GRUB 2.x users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-boot/grub-2.02_beta2-r8"

After upgrading, make sure to run the grub2-install command with options appropriate for your system. See the GRUB2 Quick Start guide in the references below for examples. Your system will be vulnerable until this action is performed.

OSVersionArchitecturePackageVersionFilename
Gentooanyallsys-boot/grub< 2.02_beta2-r8UNKNOWN

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

43.0%