A buffer overflow was discovered in NTFS-3G before 2022.10.3. Crafted metadata in an NTFS image can cause code execution. A local attacker can exploit this if the ntfs-3g binary is setuid root. A physically proximate attacker can exploit this if NTFS-3G software is configured to execute upon attachment of an external storage device.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3201-1 | ntfs-3g security update |
Debian DSA |
DSA-5270-1 | ntfs-3g security update |
EUVD |
EUVD-2022-43581 | A buffer overflow was discovered in NTFS-3G before 2022.10.3. Crafted metadata in an NTFS image can cause code execution. A local attacker can exploit this if the ntfs-3g binary is setuid root. A physically proximate attacker can exploit this if NTFS-3G software is configured to execute upon attachment of an external storage device. |
Ubuntu USN |
USN-5711-1 | NTFS-3G vulnerability |
Ubuntu USN |
USN-5711-2 | NTFS-3G vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 02 May 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-05-02T18:42:11.770Z
Reserved: 2022-09-08T00:00:00.000Z
Link: CVE-2022-40284
Updated: 2024-08-03T12:14:39.985Z
Status : Modified
Published: 2022-11-06T23:15:09.463
Modified: 2025-05-02T19:15:53.693
Link: CVE-2022-40284
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN