Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2025-03834

Опубликовано: 11 фев. 2025
Источник: fstec
CVSS3: 6.7
CVSS2: 6.8
EPSS Низкий

Описание

Уязвимость файловой системы UFS загрузчика операционных систем Grub2 связана с записью за границами буфера памяти. Эксплуатация уязвимости может позволить нарушителю обойти механизм безопасной загрузки

Вендор

Novell Inc.
Erich Boleyn
Сообщество свободного программного обеспечения
Red Hat Inc.

Наименование ПО

Suse Linux Enterprise Desktop
Suse Linux Enterprise Server
SUSE Linux Enterprise Module for Basesystem
SUSE CaaS Platform
SUSE Linux Enterprise Point of Sale
SUSE Linux Enterprise Module for Server Applications
SUSE OpenStack Cloud Crowbar
SUSE Enterprise Storage
HPE Helion Openstack
Grub2
SUSE Manager Proxy
SUSE Manager Retail Branch Server
Debian GNU/Linux
SUSE Linux Enterprise High Performance Computing
SUSE Manager Server
SUSE Linux Enterprise Micro
Red Hat OpenShift Container Platform
Red Hat Enterprise Linux
SUSE Linux Enterprise Real Time
openSUSE Leap Micro
SUSE Manager Proxy Module

Версия ПО

12 SP3 (Suse Linux Enterprise Desktop)
12 SP4 (Suse Linux Enterprise Desktop)
12 SP3 (Suse Linux Enterprise Server)
12 SP4 (Suse Linux Enterprise Server)
15 (SUSE Linux Enterprise Module for Basesystem)
15 SP1 (SUSE Linux Enterprise Module for Basesystem)
3.0 (SUSE CaaS Platform)
12 SP2-CLIENT (SUSE Linux Enterprise Point of Sale)
12 SP2-BCL (Suse Linux Enterprise Server)
12 SP2-ESPOS (Suse Linux Enterprise Server)
12 SP2-LTSS (Suse Linux Enterprise Server)
12 SP3-LTSS (Suse Linux Enterprise Server)
15 SP1 (SUSE Linux Enterprise Module for Server Applications)
15 (SUSE Linux Enterprise Module for Server Applications)
12 SP3-BCL (Suse Linux Enterprise Server)
8 (SUSE OpenStack Cloud Crowbar)
6 (SUSE Enterprise Storage)
8 (HPE Helion Openstack)
12 SP3-ESPOS (Suse Linux Enterprise Server)
12 SP2 (Suse Linux Enterprise Desktop)
9 (SUSE OpenStack Cloud Crowbar)
15-LTSS (Suse Linux Enterprise Server)
15 SP2 (SUSE Linux Enterprise Module for Basesystem)
11 SP4 (Suse Linux Enterprise Desktop)
- (Grub2)
15 SP2 (SUSE Linux Enterprise Module for Server Applications)
11 SP2 (Suse Linux Enterprise Server)
10 SP4 LTSS (Suse Linux Enterprise Server)
12 SP4-ESPOS (Suse Linux Enterprise Server)
4.0 (SUSE CaaS Platform)
12 SP4-LTSS (Suse Linux Enterprise Server)
15 SP1-BCL (Suse Linux Enterprise Server)
15 SP1-LTSS (Suse Linux Enterprise Server)
4.0 (SUSE Manager Proxy)
4.0 (SUSE Manager Retail Branch Server)
15 SP3 (SUSE Linux Enterprise Module for Basesystem)
15 SP1 (Suse Linux Enterprise Server)
11 (Debian GNU/Linux)
12 (Debian GNU/Linux)
15 SP3 (SUSE Linux Enterprise High Performance Computing)
15 SP3 (Suse Linux Enterprise Server)
4.2 (SUSE Manager Proxy)
4.2 (SUSE Manager Server)
15 SP3 (Suse Linux Enterprise Desktop)
7 (SUSE Enterprise Storage)
15 SP2 (Suse Linux Enterprise Server)
4.1 (SUSE Manager Server)
4.1 (SUSE Manager Proxy)
5.0 (SUSE Linux Enterprise Micro)
5.1 (SUSE Linux Enterprise Micro)
4.1 (SUSE Manager Retail Branch Server)
15 SP4 (Suse Linux Enterprise Server)
15 SP2 (Suse Linux Enterprise Desktop)
4 (Red Hat OpenShift Container Platform)
15 SP4 (Suse Linux Enterprise Desktop)
15 (Suse Linux Enterprise Server)
15 SP2-BCL (Suse Linux Enterprise Server)
4.2 (SUSE Manager Retail Branch Server)
9 (Red Hat Enterprise Linux)
15 SP2-LTSS (Suse Linux Enterprise Server)
15 SP2 (SUSE Linux Enterprise Real Time)
15 SP4 (SUSE Linux Enterprise High Performance Computing)
15 SP1 (Suse Linux Enterprise Desktop)
15 (Suse Linux Enterprise Desktop)
10 SP4 (Suse Linux Enterprise Server)
5.2 (openSUSE Leap Micro)
15 SP4 (SUSE Linux Enterprise Module for Basesystem)
5.3 (openSUSE Leap Micro)
15 SP3-ESPOS (SUSE Linux Enterprise High Performance Computing)
15 SP3 (SUSE Linux Enterprise Real Time)
15 SP3-BCL (Suse Linux Enterprise Server)
15 SP5 (Suse Linux Enterprise Server)
15 SP5 (Suse Linux Enterprise Desktop)
15 SP5 (SUSE Linux Enterprise High Performance Computing)
15 SP5 (SUSE Linux Enterprise Module for Basesystem)
15 SP4 (SUSE Linux Enterprise Real Time)
5.4 (openSUSE Leap Micro)
5.5 (openSUSE Leap Micro)
6.0 (SUSE Linux Enterprise Micro)
6.1 (SUSE Linux Enterprise Micro)
4.2 (SUSE Manager Proxy Module)

Тип ПО

Операционная система
Прикладное ПО информационных систем
Сетевое средство

Операционные системы и аппаратные платформы

Novell Inc. Suse Linux Enterprise Desktop 12 SP3
Novell Inc. Suse Linux Enterprise Desktop 12 SP4
Novell Inc. Suse Linux Enterprise Server 12 SP3
Novell Inc. Suse Linux Enterprise Server 12 SP4
Novell Inc. Suse Linux Enterprise Server 12 SP2-BCL
Novell Inc. Suse Linux Enterprise Server 12 SP2-ESPOS
Novell Inc. Suse Linux Enterprise Server 12 SP2-LTSS
Novell Inc. Suse Linux Enterprise Server 12 SP3-LTSS
Novell Inc. Suse Linux Enterprise Server 12 SP3-BCL
Novell Inc. Suse Linux Enterprise Server 12 SP3-ESPOS
Novell Inc. Suse Linux Enterprise Desktop 12 SP2
Novell Inc. Suse Linux Enterprise Server 15-LTSS
Novell Inc. Suse Linux Enterprise Desktop 11 SP4
Erich Boleyn Grub2 -
Novell Inc. Suse Linux Enterprise Server 11 SP2
Novell Inc. Suse Linux Enterprise Server 10 SP4 LTSS
Novell Inc. Suse Linux Enterprise Server 12 SP4-ESPOS
Novell Inc. Suse Linux Enterprise Server 12 SP4-LTSS
Novell Inc. Suse Linux Enterprise Server 15 SP1-BCL
Novell Inc. Suse Linux Enterprise Server 15 SP1-LTSS
Novell Inc. Suse Linux Enterprise Server 15 SP1
Сообщество свободного программного обеспечения Debian GNU/Linux 11
Сообщество свободного программного обеспечения Debian GNU/Linux 12
Novell Inc. Suse Linux Enterprise Server 15 SP3
Novell Inc. Suse Linux Enterprise Desktop 15 SP3
Novell Inc. Suse Linux Enterprise Server 15 SP2
Novell Inc. Suse Linux Enterprise Server 15 SP4
Novell Inc. Suse Linux Enterprise Desktop 15 SP2
Novell Inc. Suse Linux Enterprise Desktop 15 SP4
Novell Inc. Suse Linux Enterprise Server 15
Novell Inc. Suse Linux Enterprise Server 15 SP2-BCL
Red Hat Inc. Red Hat Enterprise Linux 9
Novell Inc. Suse Linux Enterprise Server 15 SP2-LTSS
Novell Inc. SUSE Linux Enterprise Real Time 15 SP2
Novell Inc. Suse Linux Enterprise Desktop 15 SP1
Novell Inc. Suse Linux Enterprise Desktop 15
Novell Inc. Suse Linux Enterprise Server 10 SP4
Novell Inc. openSUSE Leap Micro 5.2
Novell Inc. openSUSE Leap Micro 5.3
Novell Inc. SUSE Linux Enterprise Real Time 15 SP3
Novell Inc. Suse Linux Enterprise Server 15 SP3-BCL
Novell Inc. Suse Linux Enterprise Server 15 SP5
Novell Inc. Suse Linux Enterprise Desktop 15 SP5
Novell Inc. SUSE Linux Enterprise Real Time 15 SP4
Novell Inc. openSUSE Leap Micro 5.4
Novell Inc. openSUSE Leap Micro 5.5

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 6,8)
Средний уровень опасности (базовая оценка CVSS 3.1 составляет 6,7)

Возможные меры по устранению уязвимости

Компенсирующие меры:
- использование средств межсетевого экранирования для ограничения удалённого доступа к загрузчику GRUB;
- использование пароля для доступа к загрузчику GRUB в целях предотвращения попыток эксплуатации уязвимости;
- использование функционала мониторинга и журналирования для отслеживания попыток доступа к загрузчику GRUB.
Использование рекомендаций:
Для продуктов Novell Inc.:
https://www.suse.com/security/cve/CVE-2024-45781.html
Для Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2024-45781
Для grub2:
https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
https://www.openwall.com/lists/oss-security/2025/02/18/3
Для программных продуктов Red Hat Inc.:
https://access.redhat.com/security/cve/CVE-2024-45781

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Информация об устранении отсутствует

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 11%
0.00041
Низкий

6.7 Medium

CVSS3

6.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 6.7
ubuntu
6 месяцев назад

A flaw was found in grub2. When reading a symbolic link's name from a UFS filesystem, grub2 fails to validate the string length taken as an input. The lack of validation may lead to a heap out-of-bounds write, causing data integrity issues and eventually allowing an attacker to circumvent secure boot protections.

CVSS3: 6.7
redhat
6 месяцев назад

A flaw was found in grub2. When reading a symbolic link's name from a UFS filesystem, grub2 fails to validate the string length taken as an input. The lack of validation may lead to a heap out-of-bounds write, causing data integrity issues and eventually allowing an attacker to circumvent secure boot protections.

CVSS3: 6.7
nvd
6 месяцев назад

A flaw was found in grub2. When reading a symbolic link's name from a UFS filesystem, grub2 fails to validate the string length taken as an input. The lack of validation may lead to a heap out-of-bounds write, causing data integrity issues and eventually allowing an attacker to circumvent secure boot protections.

CVSS3: 6.7
debian
6 месяцев назад

A flaw was found in grub2. When reading a symbolic link's name from a ...

CVSS3: 6.7
github
6 месяцев назад

A flaw was found in grub2. When reading a symbolic link's name from a UFS filesystem, grub2 fails to validate the string length taken as an input. The lack of validation may lead to a heap out-of-bounds write, causing data integrity issues and eventually allowing an attacker to circumvent secure boot protections.

EPSS

Процентиль: 11%
0.00041
Низкий

6.7 Medium

CVSS3

6.8 Medium

CVSS2