EnglishInvader wrote:
The article says that the exploit requires physical access to the computer to be used so it doesn't really pose much of a threat.
For non-emulated servers or home systems, I agree. Laptops, on the other hand...
Also, this:
Quote:
we successfully exploited this vulnerability in a Debian 7.5 under Qemu getting a Grub rescue shell.
(emphasis mine)
...which means physical access may not actually necessary. Maybe.
Also, this *only* applies to the Grub2 password protection on the spec'd versions (roughly since 2009) of Grub.
(more technical info here:
http://hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html )
_________________
“For small creatures such as we the vastness is bearable only through love.”
―Carl Sagan