In NTFS-3G versions < 2021.8.22, when a specially crafted NTFS attribute is supplied to the function ntfs_get_attribute_value, a heap buffer overflow can occur allowing for memory disclosure or denial of service. The vulnerability is caused by an out-of-bound buffer access which can be triggered by mounting a crafted ntfs partition. The root cause is a missing consistency check after reading an MFT record : the "bytes_in_use" field should be less than the "bytes_allocated" field. When it is not, the parsing of the records proceeds into the wild.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2819-1 ntfs-3g security update
Debian DSA Debian DSA DSA-4971-1 ntfs-3g security update
EUVD EUVD EUVD-2021-19996 In NTFS-3G versions < 2021.8.22, when a specially crafted NTFS attribute is supplied to the function ntfs_get_attribute_value, a heap buffer overflow can occur allowing for memory disclosure or denial of service. The vulnerability is caused by an out-of-bound buffer access which can be triggered by mounting a crafted ntfs partition. The root cause is a missing consistency check after reading an MFT record : the "bytes_in_use" field should be less than the "bytes_allocated" field. When it is not, the parsing of the records proceeds into the wild.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T23:42:20.414Z

Reserved: 2021-05-20T00:00:00

Link: CVE-2021-33285

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-09-07T14:15:11.567

Modified: 2024-11-21T06:08:38.330

Link: CVE-2021-33285

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-08-30T00:00:00Z

Links: CVE-2021-33285 - Bugzilla

cve-icon OpenCVE Enrichment

No data.