Memory Corruption Vulnerability in GRUB2 Affects Red Hat and Fedora
CVE-2021-20233
Key Information:
Badges
Summary
A memory corruption flaw in GRUB2 versions prior to 2.06 allows an attacker to manipulate the memory by incorrectly calculating the length of quoted inputs in the menu rendering code. As the system incorrectly assumes that a quoted single quote requires three characters instead of four, this results in a potential one-byte memory corruption for each quote used. This vulnerability can threaten data confidentiality, integrity, and system availability, revealing significant risks for users relying on affected systems.
Affected Version(s)
grub2 grub 2.06
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved