PT-2022-5491 · Grub2 +11 · Grub2 +11
Daniel Axtens
·
Published
2022-11-15
·
Updated
2024-09-05
·
CVE-2022-3775
7.1
High
Base vector | Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
grub2 (affected versions not specified)
Description:
The issue arises when rendering certain unicode sequences, as grub2's font code does not properly validate if the informed glyph's width and height is constrained within bitmap size. This allows an attacker to craft an input that leads to an out-of-bounds write into grub2's heap, resulting in memory corruption and availability issues. Although complex, arbitrary code execution cannot be ruled out. The vulnerability can be exploited by remote attackers to execute arbitrary code and impact the system.
Recommendations:
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
RCE
Memory Corruption
Weakness Enumeration
Related Identifiers
Affected Products
References · 129
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28735 · Security Note
- https://ubuntu.com/security/CVE-2022-28733 · Vendor Advisory
- https://ubuntu.com/security/notices/USN-6355-1 · Vendor Advisory
- https://osv.dev/vulnerability/DLA-3190-2 · Vendor Advisory
- https://wiki.astralinux.ru/astra-linux-se47-bulletin-2023-0131SE47MD · Vendor Advisory
- https://osv.dev/vulnerability/RLSA-2023:0049 · Vendor Advisory
- https://errata.altlinux.org/ALT-PU-2023-5782 · Vendor Advisory
- https://osv.dev/vulnerability/SUSE-SU-2022:4140-1 · Vendor Advisory
- https://osv.dev/vulnerability/SUSE-SU-2022:4141-1 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3696 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28737 · Security Note
- http://repo.red-soft.ru/redos/7.3c/x86_64/updates · Vendor Advisory
- https://ubuntu.com/security/CVE-2021-3696 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28736 · Security Note
- https://osv.dev/vulnerability/UBUNTU-CVE-2022-3775 · Vendor Advisory