First published: Thu Mar 21 2019(Updated: )
An integer underflow issue exists in ntfs-3g 2017.3.23. A local attacker could potentially exploit this by running /bin/ntfs-3g with specially crafted arguments from a specially crafted directory to cause a heap buffer overflow, resulting in a crash or the ability to execute arbitrary code. In installations where /bin/ntfs-3g is a setuid-root binary, this could lead to a local escalation of privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ntfs-3g | 1:2017.3.23AR.3-3+deb10u2 1:2017.3.23AR.3-3+deb10u3 1:2017.3.23AR.3-4+deb11u3 1:2022.10.3-1 | |
redhat/libguestfs-winsupport | <0:7.2-3.el7 | 0:7.2-3.el7 |
Tuxera Ntfs-3g | =2017.3.23 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux Eus | =8.1 | |
Redhat Enterprise Linux Eus | =8.2 | |
Redhat Enterprise Linux Eus | =8.4 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =8.2 | |
Redhat Enterprise Linux Server Aus | =8.4 | |
Redhat Enterprise Linux Server Tus | =8.2 | |
Redhat Enterprise Linux Server Tus | =8.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID of this issue is CVE-2019-9755.
The severity of CVE-2019-9755 is low.
The vulnerability in ntfs-3g 2017.3.23 occurs due to an integer underflow issue.
A local attacker could potentially exploit this vulnerability by running /bin/ntfs-3g with specially crafted arguments from a specially crafted directory to cause a heap buffer overflow, resulting in a crash or the ability to execute arbitrary code.
The affected software packages are libguestfs-winsupport (version 0:7.2-3.el7) and ntfs-3g (versions 1:2017.3.23AR.3-3+deb10u2, 1:2017.3.23AR.3-3+deb10u3, 1:2017.3.23AR.3-4+deb11u3, 1:2022.10.3-1).