A buffer overflow was discovered in NTFS-3G before 2022.10.3. Crafted metadata in an NTFS image can cause code execution. A local attacker can exploit this if the ntfs-3g binary is setuid root. A physically proximate attacker can exploit this if NTFS-3G software is configured to execute upon attachment of an external storage device.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2022/10/31/2 | Mailing List Third Party Advisory |
https://github.com/tuxera/ntfs-3g/releases | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/11/msg00029.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IA2D4PYOR7ABI7BWBMMMYKY2OPHTV2NI/ | Issue Tracking Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2BOQ7YLFT43KLXEN3EB6CS4DP635RJWP/ | Issue Tracking Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UGDKGXA4R2ZVUQ3CT4D4YGTFMNZQA7HW/ | Issue Tracking Third Party Advisory |
https://security.gentoo.org/glsa/202301-01 | Third Party Advisory |
Information
Published : 2022-11-06 15:15
Updated : 2023-01-31 09:36
NVD link : CVE-2022-40284
Mitre link : CVE-2022-40284
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
debian
- debian_linux
fedoraproject
- fedora
tuxera
- ntfs-3g