Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45778: Integer Overflow or Wraparound

0
Medium
VulnerabilityCVE-2024-45778cvecve-2024-45778
Published: Mon Mar 03 2025 (03/03/2025, 17:05:13 UTC)
Source: CVE Database V5

Description

A stack overflow flaw was found when reading a BFS file system. A crafted BFS filesystem may lead to an uncontrolled loop, causing grub2 to crash.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:04:51 UTC

Technical Analysis

CVE-2024-45778 is a vulnerability identified in the GRUB2 bootloader related to its handling of BFS (Be File System) filesystems. The issue arises from an integer overflow or wraparound condition when reading a crafted BFS filesystem image. This flaw leads to an uncontrolled loop during the parsing process, which causes a stack overflow and results in the crash of GRUB2. The vulnerability is classified with a CVSS 3.1 base score of 4.1, indicating medium severity. The attack vector is local (AV:L), requiring high privileges (PR:H) and no user interaction (UI:N). The impact is limited to availability (A:H), with no confidentiality or integrity impact. Since GRUB2 is a widely used bootloader in Linux and Unix-like systems, this vulnerability could cause denial of service by preventing systems from booting properly if a malicious BFS filesystem is mounted or accessed during boot. No known exploits have been reported in the wild, and no patches are currently linked, but the vulnerability has been publicly disclosed. The flaw is particularly relevant in environments where BFS filesystems are used or accessible, which is less common than other filesystems but still present in some niche or legacy systems. The root cause is an integer overflow or wraparound leading to an uncontrolled loop, a classic programming error that can be exploited to cause resource exhaustion and crashes.

Potential Impact

The primary impact of CVE-2024-45778 is denial of service due to GRUB2 crashing when processing a crafted BFS filesystem. This can prevent affected systems from booting, causing operational disruptions. Although the confidentiality and integrity of data are not directly compromised, the availability impact can be significant for critical systems relying on GRUB2, especially servers and infrastructure devices. Organizations using BFS filesystems or those that might mount such filesystems during boot are at risk. The requirement for local high-privilege access limits remote exploitation but insider threats or compromised accounts could trigger the vulnerability. The lack of known exploits reduces immediate risk, but the public disclosure means attackers could develop exploits. Systems that rely on GRUB2 for booting, including many Linux distributions and embedded devices, could face outages or require recovery procedures. The impact is more pronounced in environments with limited physical access or automated recovery mechanisms.

Mitigation Recommendations

Organizations should monitor for patches or updates from GRUB2 maintainers and apply them promptly once available. Until patches are released, restrict access to BFS filesystems and avoid mounting or using BFS images on systems that rely on GRUB2 for booting. Implement strict access controls to limit local high-privilege user capabilities, reducing the risk of exploitation. Employ system integrity monitoring to detect unusual filesystem manipulations or boot failures. Consider using alternative filesystems or bootloaders if BFS usage is not mandatory. Maintain robust backup and recovery procedures to quickly restore systems in case of boot failures. For environments where BFS is necessary, conduct thorough testing of GRUB2 behavior with BFS filesystems and isolate vulnerable systems from critical infrastructure. Additionally, educate system administrators about the vulnerability and encourage vigilance for suspicious local activity.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-09-08T01:57:12.948Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6916966eb9f11918f9c6af18

Added to database: 11/14/2025, 2:39:42 AM

Last enriched: 2/28/2026, 7:04:51 AM

Last updated: 3/23/2026, 8:25:13 PM

Views: 114

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses