An integer underflow issue exists in ntfs-3g 2017.3.23. A local attacker could potentially exploit this by running /bin/ntfs-3g with specially crafted arguments from a specially crafted directory to cause a heap buffer overflow, resulting in a crash or the ability to execute arbitrary code. In installations where /bin/ntfs-3g is a setuid-root binary, this could lead to a local escalation of privileges.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHBA-2019:3723 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:2308 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:3345 | Third Party Advisory |
https://security.gentoo.org/glsa/202007-45 | Third Party Advisory |
https://www.tuxera.com/community/release-history/ | Release Notes Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-06-05T14:57:27
Updated: 2020-07-27T02:06:12
Reserved: 2019-03-13T00:00:00
Link: CVE-2019-9755
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-06-05T15:29:03.920
Modified: 2022-04-26T20:26:25.487
Link: CVE-2019-9755
JSON object: View
Redhat Information
No data.