Show filters
2,628 Total Results
Displaying 61-70 of 2,628
Sort by:
Attacker Value
Unknown

CVE-2025-0624

Disclosure Date: February 19, 2025 (last updated February 20, 2025)
A flaw was found in grub2. During the network boot process, when trying to search for the configuration file, grub copies data from a user controlled environment variable into an internal buffer using the grub_strcpy() function. During this step, it fails to consider the environment variable length when allocating the internal buffer, resulting in an out-of-bounds write. If correctly exploited, this issue may result in remote code execution through the same network segment grub is searching for the boot information, which can be used to by-pass secure boot protections.
Attacker Value
Unknown

CVE-2025-1118

Disclosure Date: February 19, 2025 (last updated February 20, 2025)
A flaw was found in grub2. Grub's dump command is not blocked when grub is in lockdown mode, which allows the user to read any memory information, and an attacker may leverage this in order to extract signatures, salts, and other sensitive information from the memory.
Attacker Value
Unknown

CVE-2024-45777

Disclosure Date: February 19, 2025 (last updated February 20, 2025)
A flaw was found in grub2. The calculation of the translation buffer when reading a language .mo file in grub_gettext_getstr_from_position() may overflow, leading to a Out-of-bound write. This issue can be leveraged by an attacker to overwrite grub2's sensitive heap data, eventually leading to the circumvention of secure boot protections.
Attacker Value
Unknown

CVE-2024-52541

Disclosure Date: February 19, 2025 (last updated February 20, 2025)
Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.
0
Attacker Value
Unknown

CVE-2025-0622

Disclosure Date: February 18, 2025 (last updated February 19, 2025)
A flaw was found in command/gpg. In some scenarios, hooks created by loaded modules are not removed when the related module is unloaded. This flaw allows an attacker to force grub2 to call the hooks once the module that registered it was unloaded, leading to a use-after-free vulnerability. If correctly exploited, this vulnerability may result in arbitrary code execution, eventually allowing the attacker to bypass secure boot protections.
Attacker Value
Unknown

CVE-2024-45783

Disclosure Date: February 18, 2025 (last updated February 19, 2025)
A flaw was found in grub2. When failing to mount an HFS+ grub, the hfsplus filesystem driver doesn't properly set an ERRNO value. This issue may lead to a NULL pointer access.
Attacker Value
Unknown

CVE-2024-45781

Disclosure Date: February 18, 2025 (last updated February 19, 2025)
A flaw was found in grub2. When reading a symbolic link's name from a UFS filesystem, grub2 fails to validate the string length taken as an input. The lack of validation may lead to a heap out-of-bounds write, causing data integrity issues and eventually allowing an attacker to circumvent secure boot protections.
Attacker Value
Unknown

CVE-2024-45776

Disclosure Date: February 18, 2025 (last updated February 19, 2025)
When reading the language .mo file in grub_mofile_open(), grub2 fails to verify an integer overflow when allocating its internal buffer. A crafted .mo file may lead the buffer size calculation to overflow, leading to out-of-bound reads and writes. This flaw allows an attacker to leak sensitive data or overwrite critical data, possibly circumventing secure boot protections.
Attacker Value
Unknown

CVE-2024-45775

Disclosure Date: February 18, 2025 (last updated February 19, 2025)
A flaw was found in grub2 where the grub_extcmd_dispatcher() function calls grub_arg_list_alloc() to allocate memory for the grub's argument list. However, it fails to check in case the memory allocation fails. Once the allocation fails, a NULL point will be processed by the parse_option() function, leading grub to crash or, in some rare scenarios, corrupt the IVT data.
Attacker Value
Unknown

CVE-2025-26465

Disclosure Date: February 18, 2025 (last updated February 19, 2025)
A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
0