CVE-2024-45780

6.7 MEDIUM

📋 TL;DR

CVE-2024-45780 is a heap buffer overflow vulnerability in grub2's tar file parser that allows integer overflow during filename buffer allocation. Attackers can exploit this with a crafted tar file to write out-of-bounds heap memory, potentially bypassing secure boot protections. Systems using grub2 bootloader with tar support are affected.

💻 Affected Systems

Products:
  • grub2
Versions: All versions prior to patched releases (specific versions depend on distribution)
Operating Systems: Linux distributions using grub2 bootloader
Default Config Vulnerable: ⚠️ Yes
Notes: Requires tar support enabled in grub2 (common in many distributions). Systems without tar support in grub2 are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete secure boot bypass allowing persistent malware installation at boot time, system compromise, and potential data exfiltration.

🟠

Likely Case

Local privilege escalation or boot process manipulation requiring physical access or administrative privileges to place malicious tar files.

🟢

If Mitigated

Limited impact if secure boot is properly configured and physical access controls prevent malicious file placement.

🌐 Internet-Facing: LOW - Requires local access to place malicious tar files in boot directories.
🏢 Internal Only: MEDIUM - Malicious insiders or compromised accounts could exploit if they gain access to boot configuration.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to place malicious tar files in boot directories, typically requiring local access or administrative privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Distribution-specific (check vendor advisories)

Vendor Advisory: https://access.redhat.com/security/cve/CVE-2024-45780

Restart Required: Yes

Instructions:

1. Check your distribution's security advisory. 2. Update grub2 packages using your package manager. 3. Update grub configuration: 'grub2-mkconfig -o /boot/grub2/grub.cfg'. 4. Reboot system.

🔧 Temporary Workarounds

Disable tar support in grub2

linux

Remove tar module loading from grub configuration to disable vulnerable functionality

Edit /etc/default/grub and remove 'tar' from GRUB_PRELOAD_MODULES
Run: grub2-mkconfig -o /boot/grub2/grub.cfg

🧯 If You Can't Patch

  • Restrict physical access to systems and limit administrative privileges
  • Implement strict access controls on /boot directory and grub configuration files

🔍 How to Verify

Check if Vulnerable:

Check grub2 version and compare against patched versions in vendor advisories

Check Version:

rpm -q grub2 (RHEL/CentOS) or dpkg -l | grep grub (Debian/Ubuntu)

Verify Fix Applied:

Verify grub2 package version matches patched version from vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected grub errors during boot
  • Failed boot attempts with tar-related errors

Network Indicators:

  • None - local exploitation only

SIEM Query:

Search for failed boot events or grub error messages in system logs

🔗 References

📤 Share & Export