A buffer overflow was discovered in NTFS-3G before 2022.10.3. Crafted metadata in an NTFS image can cause code execution. A local attacker can exploit this if the ntfs-3g binary is setuid root. A physically proximate attacker can exploit this if NTFS-3G software is configured to execute upon attachment of an external storage device.
References
Configurations
History
02 May 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://security.gentoo.org/glsa/202301-01 - Third Party Advisory | |
References | () https://github.com/tuxera/ntfs-3g/releases - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2022/10/31/2 - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/11/msg00029.html - Mailing List, Third Party Advisory |
07 Nov 2023, 03:52
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2022-11-06 23:15
Updated : 2025-05-02 19:15
NVD link : CVE-2022-40284
Mitre link : CVE-2022-40284
JSON object : View
Products Affected
debian
- debian_linux
tuxera
- ntfs-3g
fedoraproject
- fedora
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')