CVE-2013-4577
Summary
| CVE | CVE-2013-4577 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2014-05-12 14:55:05 UTC |
| Updated | 2026-05-06 22:30:45 UTC |
| Description | A certain Debian patch for GNU GRUB uses world-readable permissions for grub.cfg, which allows local users to obtain password hashes, as demonstrated by reading the password_pbkdf2 directive in the file. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
LocalAccess Complexity
LowAuthentication
NoneConfidentiality
PartialIntegrity
NoneAvailability
NoneAV:L/AC:L/Au:N/C:P/I:N/A:N
NVD Known Affected Configurations (CPE 2.3)
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| oss-sec: CVE Request: grub-mkconfig | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Patch |
| oss-sec: Re: CVE Request: grub-mkconfig | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Patch |
| #632598 - grub-mkconfig: CVE-2013-4577: should set safer permissions even when hashed passwords are found - Debian Bug report logs | af854a3a-2127-422b-91ae-364da2661108 | bugs.debian.org | |
| oss-security - CVE-2023-4001: a password bypass vulnerability in the downstream GRUB boot manager | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.