Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.105514
Categoría:F5 Local Security Checks
Título:F5 BIG-IP - GRUB2 vulnerability CVE-2015-8370
Resumen:The remote host is missing a security patch.
Descripción:Summary:
The remote host is missing a security patch.

Vulnerability Insight:
Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an 'Off-by-two' or 'Out of bounds overwrite' memory error.

Vulnerability Impact:
This vulnerability can be exploited under certain circumstances, allowing physically proximate attackers to bypass the system's access authentication. By default, the GRUB2 configuration used in F5 products does not expose this issue. The customization of GRUB2 configurations is not supported.

Solution:
See the referenced vendor advisory for a solution.

CVSS Score:
6.9

CVSS Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2015-8370
BugTraq ID: 79358
http://www.securityfocus.com/bid/79358
Bugtraq: 20151215 Back to 28: Grub2 Authentication Bypass 0-Day [CVE-2015-8370] (Google Search)
http://www.securityfocus.com/archive/1/537115/100/0/threaded
Debian Security Information: DSA-3421 (Google Search)
http://www.debian.org/security/2015/dsa-3421
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174049.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173703.html
http://seclists.org/fulldisclosure/2015/Dec/69
https://security.gentoo.org/glsa/201512-03
http://hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html
http://packetstormsecurity.com/files/134831/Grub2-Authentication-Bypass.html
http://www.openwall.com/lists/oss-security/2015/12/15/6
RedHat Security Advisories: RHSA-2015:2623
http://rhn.redhat.com/errata/RHSA-2015-2623.html
http://www.securitytracker.com/id/1034422
SuSE Security Announcement: SUSE-SU-2015:2385 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00039.html
SuSE Security Announcement: SUSE-SU-2015:2386 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00040.html
SuSE Security Announcement: SUSE-SU-2015:2387 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00041.html
SuSE Security Announcement: SUSE-SU-2015:2399 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00044.html
SuSE Security Announcement: openSUSE-SU-2015:2375 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00037.html
SuSE Security Announcement: openSUSE-SU-2015:2392 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00043.html
SuSE Security Announcement: openSUSE-SU-2016:0036 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00003.html
http://www.ubuntu.com/usn/USN-2836-1
CopyrightCopyright (C) 2016 Greenbone Networks GmbH

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.