CVE-2019-9755
Summary
| CVE | CVE-2019-9755 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-06-05 15:29:00 UTC |
| Updated | 2022-04-26 20:26:00 UTC |
| Description | An integer underflow issue exists in ntfs-3g 2017.3.23. A local attacker could potentially exploit this by running /bin/ntfs-3g with specially crafted arguments from a specially crafted directory to cause a heap buffer overflow, resulting in a crash or the ability to execute arbitrary code. In installations where /bin/ntfs-3g is a setuid-root binary, this could lead to a local escalation of privileges. |
Risk And Classification
Problem Types: CWE-787 | CWE-191
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Redhat | Enterprise Linux | 8.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Eus | 8.1 | All | All | All |
| Operating System | Redhat | Enterprise Linux Eus | 8.2 | All | All | All |
| Operating System | Redhat | Enterprise Linux Eus | 8.4 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Aus | 8.2 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Aus | 8.4 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Tus | 8.2 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Tus | 8.4 | All | All | All |
| Application | Tuxera | Ntfs-3g | 2017.3.23 | All | All | All |
| Application | Tuxera | Ntfs-3g | 2017.3.23 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| NTFS-3G: Remote code execution, possible privilege escalation (GLSA 202007-45) — Gentoo security | GENTOO | security.gentoo.org | |
| Red Hat Customer Portal | REDHAT | access.redhat.com | |
| NTFS-3G Release History | MISC | www.tuxera.com | Release Notes, Vendor Advisory |
| Red Hat Customer Portal | REDHAT | access.redhat.com | |
| Red Hat Customer Portal | REDHAT | access.redhat.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 159660 Oracle Enterprise Linux Security Update for virt:ol (ELSA-2019-3345)
- 377224 Alibaba Cloud Linux Security Update for libguestfs-winsupport (ALINUX2-SA-2019:0069)
- 377373 Alibaba Cloud Linux Security Update for virt:rhel (ALINUX3-SA-2022:0074)
- 500462 Alpine Linux Security Update for ntfs-3g
- 504219 Alpine Linux Security Update for ntfs-3g
- 751107 SUSE Enterprise Linux Security Update for ntfs-3g_ntfsprogs (SUSE-SU-2021:2965-1)
- 751113 OpenSUSE Security Update for ntfs-3g_ntfsprogs (openSUSE-SU-2021:2971-1)
- 751127 OpenSUSE Security Update for ntfs-3g_ntfsprogs (openSUSE-SU-2021:1244-1)
- 901745 Common Base Linux Mariner (CBL-Mariner) Security Update for ntfs-3g (7293-1)
- 901893 Common Base Linux Mariner (CBL-Mariner) Security Update for ntfs-3g (6747-1)
- 940336 AlmaLinux Security Update for virt:rhel (ALSA-2019:3345)
- 960798 Rocky Linux Security Update for virt:rhel (RLSA-2019:3345)