{"uuid": "e7f98233-a156-4ec4-a638-e3fe83383da4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45780", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6204", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-45780\n\ud83d\udd25 CVSS Score: 6.7 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: A flaw was found in grub2. When reading tar files, grub2 allocates an internal buffer for the file name. However, it fails to properly verify the allocation against possible integer overflows. It's possible to cause the allocation length to overflow with a crafted tar file, leading to a heap out-of-bounds write. This flaw eventually allows an attacker to circumvent secure boot protections.\n\ud83d\udccf Published: 2025-03-03T14:18:50.957Z\n\ud83d\udccf Modified: 2025-03-03T14:18:50.957Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2024-45780\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2345856", "creation_timestamp": "2025-03-03T14:29:54.000000Z"}