Rapid7 Vulnerability & Exploit Database

Red Hat: CVE-2021-3697: CVE-2021-3697 grub2: Crafted JPEG image can lead to buffer underflow write in the heap (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Red Hat: CVE-2021-3697: CVE-2021-3697 grub2: Crafted JPEG image can lead to buffer underflow write in the heap (Multiple Advisories)

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
06/16/2022
Created
06/18/2022
Added
06/17/2022
Modified
12/15/2023

Description

A crafted JPEG image may lead the JPEG reader to underflow its data pointer, allowing user-controlled data to be written in heap. To a successful to be performed the attacker needs to perform some triage over the heap layout and craft an image with a malicious format and payload. This vulnerability can lead to data corruption and eventual code execution or secure boot circumvention. This flaw affects grub2 versions prior grub-2.12.

Solution(s)

  • redhat-upgrade-grub2-common
  • redhat-upgrade-grub2-debuginfo
  • redhat-upgrade-grub2-debugsource
  • redhat-upgrade-grub2-efi-aa64-modules
  • redhat-upgrade-grub2-efi-ia32
  • redhat-upgrade-grub2-efi-ia32-cdboot
  • redhat-upgrade-grub2-efi-ia32-modules
  • redhat-upgrade-grub2-efi-x64
  • redhat-upgrade-grub2-efi-x64-cdboot
  • redhat-upgrade-grub2-efi-x64-modules
  • redhat-upgrade-grub2-emu-debuginfo
  • redhat-upgrade-grub2-pc
  • redhat-upgrade-grub2-pc-modules
  • redhat-upgrade-grub2-ppc64le-modules
  • redhat-upgrade-grub2-tools
  • redhat-upgrade-grub2-tools-debuginfo
  • redhat-upgrade-grub2-tools-efi
  • redhat-upgrade-grub2-tools-efi-debuginfo
  • redhat-upgrade-grub2-tools-extra
  • redhat-upgrade-grub2-tools-extra-debuginfo
  • redhat-upgrade-grub2-tools-minimal
  • redhat-upgrade-grub2-tools-minimal-debuginfo
  • redhat-upgrade-mokutil
  • redhat-upgrade-mokutil-debuginfo
  • redhat-upgrade-mokutil-debugsource
  • redhat-upgrade-shim-ia32
  • redhat-upgrade-shim-unsigned-x64
  • redhat-upgrade-shim-x64

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;