In NTFS-3G versions < 2021.8.22, when a specially crafted NTFS attribute is supplied to the function ntfs_get_attribute_value, a heap buffer overflow can occur allowing for memory disclosure or denial of service. The vulnerability is caused by an out-of-bound buffer access which can be triggered by mounting a crafted ntfs partition. The root cause is a missing consistency check after reading an MFT record : the "bytes_in_use" field should be less than the "bytes_allocated" field. When it is not, the parsing of the records proceeds into the wild.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2021-09-07 14:15
Updated : 2024-11-21 06:08
NVD link : CVE-2021-33285
Mitre link : CVE-2021-33285
CVE.ORG link : CVE-2021-33285
JSON object : View
Products Affected
tuxera
- ntfs-3g
debian
- debian_linux
fedoraproject
- fedora
redhat
- enterprise_linux
CWE
CWE-787
Out-of-bounds Write