Vulnerability Description
GNU GRand Unified Bootloader (GRUB) 2 1.97 only compares the submitted portion of a password with the actual password, which makes it easier for physically proximate attackers to conduct brute force attacks and bypass authentication by submitting a password whose length is 1.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Grub 2 | 1.97 |
Related Weaknesses (CWE)
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555195Exploit
- http://www.openwall.com/lists/oss-security/2024/01/15/3
- http://www.securityfocus.com/bid/36968Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/54210
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555195Exploit
- http://www.openwall.com/lists/oss-security/2024/01/15/3
- http://www.securityfocus.com/bid/36968Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/54210
FAQ
What is CVE-2009-4128?
CVE-2009-4128 is a vulnerability with a CVSS score of 7.2 (HIGH). GNU GRand Unified Bootloader (GRUB) 2 1.97 only compares the submitted portion of a password with the actual password, which makes it easier for physically proximate attackers to conduct brute force a...
How severe is CVE-2009-4128?
CVE-2009-4128 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-4128?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Grub 2.