First published: Sun Nov 06 2022(Updated: )
A buffer overflow was discovered in NTFS-3G before 2022.10.3. Crafted metadata in an NTFS image can cause code execution. A local attacker can exploit this if the ntfs-3g binary is setuid root. A physically proximate attacker can exploit this if NTFS-3G software is configured to execute upon attachment of an external storage device.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ntfs-3g | <2022.10.3 | |
Debian | =10.0 | |
Fedora | =35 | |
Fedora | =36 | |
Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-40284 has a high severity due to its potential to enable code execution through a buffer overflow.
To fix CVE-2022-40284, update the NTFS-3G software to version 2022.10.3 or later on affected systems.
CVE-2022-40284 affects users of NTFS-3G prior to version 2022.10.3, particularly in settings where the binary is setuid root.
CVE-2022-40284 requires local access to exploit, making it less likely to be used in remote attacks.
The impact of CVE-2022-40284 includes potential unauthorized code execution, which could compromise system integrity.