CVE-2017-9763Improper Restriction of Operations within the Bounds of a Memory Buffer in Radare2

Severity
7.5HIGHNVD
EPSS
1.4%
top 19.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 19
Latest updateMay 17

Description

The grub_ext2_read_block function in fs/ext2.c in GNU GRUB before 2013-11-12, as used in shlr/grub/fs/ext2.c in radare2 1.5.0, allows remote attackers to cause a denial of service (excessive stack use and application crash) via a crafted binary file, related to use of a variable-size stack array.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

debiandebian/grub2< grub2 2.02~beta2-8 (bookworm)
Debiangnu/grub2< 2.02~beta2-8+3
debiandebian/radare2< grub2 2.02~beta2-8 (bookworm)
NVDradare/radare21.5.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-vvvg-pm5p-r68f: The grub_ext2_read_block function in fs/ext22022-05-17
OSV
CVE-2017-9763: The grub_ext2_read_block function in fs/ext22017-06-19

📋Vendor Advisories

2
Red Hat
grub2: Stack exhaustion in grub_ext2_read_block2017-06-11
Debian
CVE-2017-9763: grub2 - The grub_ext2_read_block function in fs/ext2.c in GNU GRUB before 2013-11-12, as...2017

💬Community

1
Bugzilla
CVE-2017-9763 grub2: Stack exhaustion in grub_ext2_read_block2017-06-20