In NTFS-3G versions < 2021.8.22, when a specially crafted NTFS inode pathname is supplied in an NTFS image a heap buffer overflow can occur resulting in memory disclosure, denial of service and even code execution.
References
Link | Resource |
---|---|
http://ntfs-3g.com | Product Vendor Advisory |
https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2021/08/30/1 | Mailing List Third Party Advisory |
https://www.debian.org/security/2021/dsa-4971 | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/766ISTT3KCARKFUIQT7N6WV6T63XOKG3/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSEKTKHO5HFZHWZNJNBJZA56472KRUZI/ | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/11/msg00013.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202301-01 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2021-09-07 08:15
Updated : 2023-01-13 11:20
NVD link : CVE-2021-35266
Mitre link : CVE-2021-35266
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
debian
- debian_linux
fedoraproject
- fedora
tuxera
- ntfs-3g