ID CVE-2019-14865
Summary A flaw was found in the grub2-set-bootflag utility of grub2. A local attacker could run this utility under resource pressure (for example by setting RLIMIT), causing grub2 configuration files to be truncated and leaving the system unbootable on subsequent reboots.
References
Vulnerable Configurations
  • cpe:2.3:a:gnu:grub2:-:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:grub2:-:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
CVSS
Base: 4.9 (as of 06-02-2024 - 18:15)
Impact:
Exploitability:
CWE CWE-267
CAPEC
  • Identify Shared Files/Directories on System
    An adversary discovers connections between systems by exploiting the target system's standard practice of revealing them in searchable, common areas. Through the identification of shared folders/drives between systems, the adversary may further their goals of locating and collecting sensitive information/files, or map potential routes for lateral movement within the network.
  • Collect Data from Clipboard
    The adversary exploits an application that allows for the copying of sensitive data or information by collecting information copied to the clipboard. Data copied to the clipboard can be accessed by other applications, such as malware built to exfiltrate or log clipboard contents on a periodic basis. In this way, the adversary aims to garner information to which he is unauthorized.
  • Probe Audio and Video Peripherals
    The adversary exploits the target system's audio and video functionalities through malware or scheduled tasks. The goal is to capture sensitive information about the target for financial, personal, political, or other gains which is accomplished by collecting communication data between two parties via the use of peripheral devices (e.g. microphones and webcams) or applications with audio and video capabilities (e.g. Skype) on a system.
  • Restful Privilege Elevation
    Rest uses standard HTTP (Get, Put, Delete) style permissions methods, but these are not necessarily correlated generally with back end programs. Strict interpretation of HTTP get methods means that these HTTP Get services should not be used to delete information on the server, but there is no access control mechanism to back up this logic. This means that unless the services are properly ACL'd and the application's service implementation are following these guidelines then an HTTP request can easily execute a delete or update on the server side. The attacker identifies a HTTP Get URL such as http://victimsite/updateOrder, which calls out to a program to update orders on a database or other resource. The URL is not idempotent so the request can be submitted multiple times by the attacker, additionally, the attacker may be able to exploit the URL published as a Get method that actually performs updates (instead of merely retrieving data). This may result in malicious or inadvertent altering of data on the server.
  • Collect Data from Screen Capture
    An adversary gathers sensitive information by exploiting the system's screen capture functionality. Through screenshots, the adversary aims to see what happens on the screen over the course of an operation. The adversary can leverage information gathered in order to carry out further attacks.
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:L/AC:L/Au:N/C:N/I:N/A:C
redhat via4
advisories
bugzilla
id 1764925
title CVE-2019-14865 grub2: grub2-set-bootflag utility causes grubenv corruption rendering the system non-bootable
oval
OR
  • comment Red Hat Enterprise Linux must be installed
    oval oval:com.redhat.rhba:tst:20070304026
  • AND
    • comment Red Hat Enterprise Linux 8 is installed
      oval oval:com.redhat.rhba:tst:20193384074
    • OR
      • AND
        • comment grub2-common is earlier than 1:2.02-78.el8_1.1
          oval oval:com.redhat.rhsa:tst:20200335001
        • comment grub2-common is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20200335002
      • AND
        • comment grub2-debugsource is earlier than 1:2.02-78.el8_1.1
          oval oval:com.redhat.rhsa:tst:20200335003
        • comment grub2-debugsource is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20200335004
      • AND
        • comment grub2-efi-aa64 is earlier than 1:2.02-78.el8_1.1
          oval oval:com.redhat.rhsa:tst:20200335005
        • comment grub2-efi-aa64 is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20200335006
      • AND
        • comment grub2-efi-aa64-cdboot is earlier than 1:2.02-78.el8_1.1
          oval oval:com.redhat.rhsa:tst:20200335007
        • comment grub2-efi-aa64-cdboot is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20200335008
      • AND
        • comment grub2-efi-aa64-modules is earlier than 1:2.02-78.el8_1.1
          oval oval:com.redhat.rhsa:tst:20200335009
        • comment grub2-efi-aa64-modules is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20200335010
      • AND
        • comment grub2-efi-ia32 is earlier than 1:2.02-78.el8_1.1
          oval oval:com.redhat.rhsa:tst:20200335011
        • comment grub2-efi-ia32 is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20200335012
      • AND
        • comment grub2-efi-ia32-cdboot is earlier than 1:2.02-78.el8_1.1
          oval oval:com.redhat.rhsa:tst:20200335013
        • comment grub2-efi-ia32-cdboot is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20200335014
      • AND
        • comment grub2-efi-ia32-modules is earlier than 1:2.02-78.el8_1.1
          oval oval:com.redhat.rhsa:tst:20200335015
        • comment grub2-efi-ia32-modules is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20200335016
      • AND
        • comment grub2-efi-x64 is earlier than 1:2.02-78.el8_1.1
          oval oval:com.redhat.rhsa:tst:20200335017
        • comment grub2-efi-x64 is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20200335018
      • AND
        • comment grub2-efi-x64-cdboot is earlier than 1:2.02-78.el8_1.1
          oval oval:com.redhat.rhsa:tst:20200335019
        • comment grub2-efi-x64-cdboot is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20200335020
      • AND
        • comment grub2-efi-x64-modules is earlier than 1:2.02-78.el8_1.1
          oval oval:com.redhat.rhsa:tst:20200335021
        • comment grub2-efi-x64-modules is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20200335022
      • AND
        • comment grub2-pc is earlier than 1:2.02-78.el8_1.1
          oval oval:com.redhat.rhsa:tst:20200335023
        • comment grub2-pc is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20200335024
      • AND
        • comment grub2-pc-modules is earlier than 1:2.02-78.el8_1.1
          oval oval:com.redhat.rhsa:tst:20200335025
        • comment grub2-pc-modules is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20200335026
      • AND
        • comment grub2-ppc64le is earlier than 1:2.02-78.el8_1.1
          oval oval:com.redhat.rhsa:tst:20200335027
        • comment grub2-ppc64le is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20200335028
      • AND
        • comment grub2-ppc64le-modules is earlier than 1:2.02-78.el8_1.1
          oval oval:com.redhat.rhsa:tst:20200335029
        • comment grub2-ppc64le-modules is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20200335030
      • AND
        • comment grub2-tools is earlier than 1:2.02-78.el8_1.1
          oval oval:com.redhat.rhsa:tst:20200335031
        • comment grub2-tools is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20152401008
      • AND
        • comment grub2-tools-efi is earlier than 1:2.02-78.el8_1.1
          oval oval:com.redhat.rhsa:tst:20200335033
        • comment grub2-tools-efi is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20200335034
      • AND
        • comment grub2-tools-extra is earlier than 1:2.02-78.el8_1.1
          oval oval:com.redhat.rhsa:tst:20200335035
        • comment grub2-tools-extra is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20200335036
      • AND
        • comment grub2-tools-minimal is earlier than 1:2.02-78.el8_1.1
          oval oval:com.redhat.rhsa:tst:20200335037
        • comment grub2-tools-minimal is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20200335038
rhsa
id RHSA-2020:0335
released 2020-02-04
severity Moderate
title RHSA-2020:0335: grub2 security update (Moderate)
rpms
  • grub2-common-1:2.02-78.el8_1.1
  • grub2-debuginfo-1:2.02-78.el8_1.1
  • grub2-debugsource-1:2.02-78.el8_1.1
  • grub2-efi-aa64-1:2.02-78.el8_1.1
  • grub2-efi-aa64-cdboot-1:2.02-78.el8_1.1
  • grub2-efi-aa64-modules-1:2.02-78.el8_1.1
  • grub2-efi-ia32-1:2.02-78.el8_1.1
  • grub2-efi-ia32-cdboot-1:2.02-78.el8_1.1
  • grub2-efi-ia32-modules-1:2.02-78.el8_1.1
  • grub2-efi-x64-1:2.02-78.el8_1.1
  • grub2-efi-x64-cdboot-1:2.02-78.el8_1.1
  • grub2-efi-x64-modules-1:2.02-78.el8_1.1
  • grub2-pc-1:2.02-78.el8_1.1
  • grub2-pc-modules-1:2.02-78.el8_1.1
  • grub2-ppc64le-1:2.02-78.el8_1.1
  • grub2-ppc64le-modules-1:2.02-78.el8_1.1
  • grub2-tools-1:2.02-78.el8_1.1
  • grub2-tools-debuginfo-1:2.02-78.el8_1.1
  • grub2-tools-efi-1:2.02-78.el8_1.1
  • grub2-tools-efi-debuginfo-1:2.02-78.el8_1.1
  • grub2-tools-extra-1:2.02-78.el8_1.1
  • grub2-tools-extra-debuginfo-1:2.02-78.el8_1.1
  • grub2-tools-minimal-1:2.02-78.el8_1.1
  • grub2-tools-minimal-debuginfo-1:2.02-78.el8_1.1
refmap via4
confirm https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14865
misc https://seclists.org/oss-sec/2019/q4/101
Last major update 06-02-2024 - 18:15
Published 29-11-2019 - 10:15
Last modified 06-02-2024 - 18:15
Back to Top