NewStart CGSL MAIN 6.06 : grub2 Multiple Vulnerabilities (NS-SA-2025-0221)

high Nessus Plugin ID 266249

Synopsis

The remote NewStart CGSL host is affected by multiple vulnerabilities.

Description

The remote NewStart CGSL host, running version MAIN 6.06, has grub2 packages installed that are affected by multiple vulnerabilities:

- Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an Off-by-two or Out of bounds overwrite memory error.
(CVE-2015-8370)

- Integer overflow in the LZO algorithm variant in Oberhumer liblzo2 and lzo-2 before 2.07 on 32-bit platforms might allow remote attackers to execute arbitrary code via a crafted Literal Run.
(CVE-2014-4607)

- A flaw was found in the grub2-set-bootflag utility of grub2. A local attacker could run this utility under resource pressure (for example by setting RLIMIT), causing grub2 configuration files to be truncated and leaving the system unbootable on subsequent reboots. (CVE-2019-14865)

- A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2020-10713)

- In grub2 versions before 2.06 the grub memory allocator doesn't check for possible arithmetic overflows on the requested allocation size. This leads the function to return invalid memory allocations which can be further used to cause possible integrity, confidentiality and availability impacts during the boot process. (CVE-2020-14308)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the vulnerable CGSL grub2 packages. Note that updated packages may not be available yet. Please contact ZTE for more information.

See Also

https://security.gd-linux.com/notice/NS-SA-2025-0221

https://security.gd-linux.com/info/CVE-2014-4607

https://security.gd-linux.com/info/CVE-2015-8370

https://security.gd-linux.com/info/CVE-2019-14865

https://security.gd-linux.com/info/CVE-2020-10713

https://security.gd-linux.com/info/CVE-2020-14308

https://security.gd-linux.com/info/CVE-2020-14309

https://security.gd-linux.com/info/CVE-2020-14310

https://security.gd-linux.com/info/CVE-2020-14311

https://security.gd-linux.com/info/CVE-2020-15705

Plugin Details

Severity: High

ID: 266249

File Name: newstart_cgsl_NS-SA-2025-0221_grub2.nasl

Version: 1.2

Type: local

Published: 9/30/2025

Updated: 10/1/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Temporal Score: 5.4

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2015-8370

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2014-4607

Vulnerability Information

CPE: p-cpe:/a:zte:cgsl_main:grub2-pc-modules, p-cpe:/a:zte:cgsl_main:grub2-tools-efi, cpe:/o:zte:cgsl_main:6, p-cpe:/a:zte:cgsl_main:grub2-tools-extra, p-cpe:/a:zte:cgsl_main:grub2-common, p-cpe:/a:zte:cgsl_main:grub2-efi-x64-modules, p-cpe:/a:zte:cgsl_main:grub2-pc, p-cpe:/a:zte:cgsl_main:grub2-tools, p-cpe:/a:zte:cgsl_main:grub2-tools-minimal, p-cpe:/a:zte:cgsl_main:grub2-efi-x64

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/ZTE-CGSL/release, Host/ZTE-CGSL/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/30/2025

Vulnerability Publication Date: 6/26/2014

Reference Information

CVE: CVE-2014-4607, CVE-2015-8370, CVE-2019-14865, CVE-2020-10713, CVE-2020-14308, CVE-2020-14309, CVE-2020-14310, CVE-2020-14311, CVE-2020-15705