An integer underflow issue exists in ntfs-3g 2017.3.23. A local attacker could potentially exploit this by running /bin/ntfs-3g with specially crafted arguments from a specially crafted directory to cause a heap buffer overflow, resulting in a crash or the ability to execute arbitrary code. In installations where /bin/ntfs-3g is a setuid-root binary, this could lead to a local escalation of privileges.
References
Link | Resource |
---|---|
https://www.tuxera.com/community/release-history/ | Release Notes Vendor Advisory |
https://access.redhat.com/errata/RHSA-2019:2308 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:3345 | Third Party Advisory |
https://access.redhat.com/errata/RHBA-2019:3723 | Third Party Advisory |
https://security.gentoo.org/glsa/202007-45 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2019-06-05 08:29
Updated : 2022-04-26 13:26
NVD link : CVE-2019-9755
Mitre link : CVE-2019-9755
JSON object : View
Products Affected
redhat
- enterprise_linux
- enterprise_linux_server_aus
- enterprise_linux_server_tus
- enterprise_linux_server
- enterprise_linux_eus
tuxera
- ntfs-3g