CVE-2020-15707

Current Description

Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.

Basic Data

PublishedJuly 29, 2020
Last ModifiedAugust 04, 2020
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-362
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:M/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score4.4
SeverityMEDIUM
Exploitability Score3.4
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationGnuGrub2********2.04
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationRedhatEnterprise Linux Atomic Host-*******
    2.3ApplicationRedhatOpenshift Container Platform4.0*******
    2.3OSCanonicalUbuntu Linux14.04***esm***
    2.3OSCanonicalUbuntu Linux16.04***lts***
    2.3OSCanonicalUbuntu Linux18.04***lts***
    2.3OSCanonicalUbuntu Linux20.04***lts***
    2.3OSDebianDebian Linux10*******
    2.3OSRedhatEnterprise Linux7.0*******
    2.3OSRedhatEnterprise Linux8.0*******
    2.3OSSuseSuse Linux Enterprise Server11*******
    2.3OSSuseSuse Linux Enterprise Server12*******
    2.3OSSuseSuse Linux Enterprise Server15*******
  • OR - Configuration 3
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSMicrosoftWindows 10-*******
    2.3OSMicrosoftWindows 101607*******
    2.3OSMicrosoftWindows 101709*******
    2.3OSMicrosoftWindows 101803*******
    2.3OSMicrosoftWindows 101809*******
    2.3OSMicrosoftWindows 101903*******
    2.3OSMicrosoftWindows 101909*******
    2.3OSMicrosoftWindows 102004*******
    2.3OSMicrosoftWindows 8.1-*******
    2.3OSMicrosoftWindows Rt 8.1-*******
    2.3OSMicrosoftWindows Server 2012-*******
    2.3OSMicrosoftWindows Server 2012r2*******
    2.3OSMicrosoftWindows Server 2016-*******
    2.3OSMicrosoftWindows Server 20161903*******
    2.3OSMicrosoftWindows Server 20161909*******
    2.3OSMicrosoftWindows Server 20162004*******
    2.3OSMicrosoftWindows Server 2019-*******

Vulnerable Software List

VendorProductVersions
Microsoft Windows Server 2019 -
Microsoft Windows Server 2012 -, r2
Microsoft Windows Server 2016 -, 1903, 1909, 2004
Microsoft Windows 8.1 -
Microsoft Windows 10 -, 1607, 1709, 1803, 1809, 1903, 1909, 2004
Microsoft Windows Rt 8.1 -
Debian Debian Linux 10
Redhat Enterprise Linux Atomic Host -
Redhat Enterprise Linux 7.0, 8.0
Redhat Openshift Container Platform 4.0
Canonical Ubuntu Linux 14.04, 16.04, 18.04, 20.04
Gnu Grub2 *
Suse Suse Linux Enterprise Server 11, 12, 15

References

NameSourceURLTags
http://ubuntu.com/security/notices/USN-4432-1http://ubuntu.com/security/notices/USN-4432-1UBUNTUThird Party Advisory
[oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilitieshttp://www.openwall.com/lists/oss-security/2020/07/29/3MLISTMailing List Third Party Advisory
https://access.redhat.com/security/vulnerabilities/grub2bootloaderhttps://access.redhat.com/security/vulnerabilities/grub2bootloaderREDHATThird Party Advisory
https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.htmlhttps://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.htmlCONFIRMIssue Tracking Vendor Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011CONFIRMThird Party Advisory
https://security.netapp.com/advisory/ntap-20200731-0008/https://security.netapp.com/advisory/ntap-20200731-0008/CONFIRMThird Party Advisory
USN-4432-1https://usn.ubuntu.com/4432-1/UBUNTU
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypasshttps://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypassUBUNTUThird Party Advisory
DSA-4735https://www.debian.org/security/2020/dsa-4735DEBIANThird Party Advisory
https://www.debian.org/security/2020-GRUB-UEFI-SecureBoothttps://www.debian.org/security/2020-GRUB-UEFI-SecureBootDEBIANThird Party Advisory
https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/CONFIRMExploit Third Party Advisory
https://www.openwall.com/lists/oss-security/2020/07/29/3https://www.openwall.com/lists/oss-security/2020/07/29/3CONFIRMMailing List Third Party Advisory
https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/SUSEThird Party Advisory
https://www.suse.com/support/kb/doc/?id=000019673https://www.suse.com/support/kb/doc/?id=000019673SUSEThird Party Advisory