CVE-2022-40284

A buffer overflow was discovered in NTFS-3G before 2022.10.3. Crafted metadata in an NTFS image can cause code execution. A local attacker can exploit this if the ntfs-3g binary is setuid root. A physically proximate attacker can exploit this if NTFS-3G software is configured to execute upon attachment of an external storage device.
Classic Buffer Overflow
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
CISA-ADPADP
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 6%
VendorProductVersion
tuxerantfs-3g
𝑥
< 2022.10.3
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ntfs-3g
bullseye
1:2017.3.23AR.3-4+deb11u4
fixed
bullseye (security)
1:2017.3.23AR.3-4+deb11u3
fixed
bookworm
1:2022.10.3-1
fixed
sid
1:2022.10.3-5
fixed
trixie
1:2022.10.3-5
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ntfs-3g
lunar
Fixed 1:2022.5.17-1ubuntu1.1
released
kinetic
Fixed 1:2022.5.17-1ubuntu1.1
released
jammy
Fixed 1:2021.8.22-3ubuntu1.2
released
focal
Fixed 1:2017.3.23AR.3-3ubuntu1.3
released
bionic
Fixed 1:2017.3.23-2ubuntu0.18.04.5
released
xenial
Fixed 1:2015.3.14AR.1-1ubuntu0.3+esm4
released
trusty
Fixed 1:2013.1.13AR.1-2ubuntu2+esm4
released