漏洞信息详情

gnu grub2 缓冲区错误漏洞

  • CNNVD编号:CNNVD-202007-1732
  • 危害等级: 高危
  • CVE编号: CVE-2020-10713
  • 漏洞类型: 缓冲区错误
  • 发布时间: 2020-07-29
  • 威胁类型: 本地
  • 更新时间: 2021-12-06
  • 厂        商:
  • 漏洞来源: Gentoo

漏洞简介

grub2是GNU计划的一款Linux系统引导程序。

grub2 2.06之前版本中存在安全漏洞。攻击者可利用该漏洞执行任意代码,影响数据机密性和完整性以及系统可用性。

漏洞公告

目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页:

https://www.gnu.org/

参考网址

来源:CERT-VN

链接:https://www.kb.cert.org/vuls/id/174059

来源:CISCO

链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-grub2-code-exec-xLePCAPY

来源:CONFIRM

链接:https://security.netapp.com/advisory/ntap-20200731-0008/

来源:MISC

链接:https://kb.vmware.com/s/article/80181

来源:DEBIAN

链接:https://www.debian.org/security/2020/dsa-4735

来源:MISC

链接:https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/

来源:GENTOO

链接:https://security.gentoo.org/glsa/202104-05

来源:securityadvisories.paloaltonetworks.com

链接:https://securityadvisories.paloaltonetworks.com/PAN-SA-2020-0008

来源:MLIST

链接:http://www.openwall.com/lists/oss-security/2020/07/29/3

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html

来源:MISC

链接:https://cve.openeuler.org/#/CVEInfo/CVE-2020-10713

来源:MISC

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1825243

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html

来源:UBUNTU

链接:https://usn.ubuntu.com/4432-1/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/159462/Red-Hat-Security-Advisory-2020-4172-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.3448/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2804.2/

来源:www.kb.cert.org

链接:https://www.kb.cert.org/vuls/id/174059

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2681/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/162414/Gentoo-Linux-Security-Advisory-202104-05.html

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2020-10713

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2021.4104

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2647/

来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2020-10713

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2617/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/158723/Red-Hat-Security-Advisory-2020-3274-01.html

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/159405/Red-Hat-Security-Advisory-2020-4115-01.html

来源:www.cybersecurity-help.cz

链接:https://www.cybersecurity-help.cz/vdb/SB2021120313

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.3407/

来源:www.nsfocus.net

链接:http://www.nsfocus.net/vulndb/47568

来源:tools.cisco.com

链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-grub2-code-exec-xLePCAPY

来源:www.cybersecurity-help.cz

链接:https://www.cybersecurity-help.cz/vdb/SB2021050105

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2591/

来源:www.ibm.com

链接:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-network-packet-capture-is-vulnerable-to-using-components-with-known-vulnerabilities/

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/GRUB2-buffer-overflow-via-grub-cfg-BootHole-32951

来源:www.huawei.com

链接:https://www.huawei.com/cn/psirt/security-notices/huawei-sn-20200730-01-grub2-cn

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/158669/Red-Hat-Security-Advisory-2020-3227-01.html

来源:www.huawei.com

链接:https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200923-01-grub2-cn

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/158765/Ubuntu-Security-Notice-USN-4432-2.html

来源:support.lenovo.com

链接:https://support.lenovo.com/us/en/product_security/LEN-34794

来源:www.nsfocus.net

链接:http://www.nsfocus.net/vulndb/48355

来源:us-cert.cisa.gov

链接:https://us-cert.cisa.gov/ics/advisories/icsa-21-336-06

受影响实体

    暂无


漏洞信息快速查询

相关漏洞

更多