First published: Wed Aug 30 2023(Updated: )
A buffer overflow was discovered in NTFS-3G before 2022.10.3. Crafted metadata in an NTFS image can cause code execution. A local attacker can exploit this if the ntfs-3g binary is setuid root. A physically proximate attacker can exploit this if NTFS-3G software is configured to execute upon attachment of an external storage device.
Affected Software | Affected Version | How to fix |
---|---|---|
ntfs-3g | <2022.10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2236130 is considered critical due to the potential for code execution via a buffer overflow.
To fix REDHAT-BUG-2236130, update NTFS-3G to version 2022.10.3 or later.
Users running Tuxera NTFS-3G versions prior to 2022.10.3 with setuid root permissions are at risk of REDHAT-BUG-2236130.
No, REDHAT-BUG-2236130 requires local access or physical proximity to exploit the vulnerability.
REDHAT-BUG-2236130 pertains to Tuxera NTFS-3G software versions earlier than 2022.10.3.