vulnerability
Ubuntu: (CVE-2021-33285): ntfs-3g vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:M/Au:N/C:C/I:C/A:C) | Sep 7, 2021 | Nov 19, 2024 | Mar 27, 2026 |
Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
Sep 7, 2021
Added
Nov 19, 2024
Modified
Mar 27, 2026
Description
In NTFS-3G versions < 2021.8.22, when a specially crafted NTFS attribute is supplied to the function ntfs_get_attribute_value, a heap buffer overflow can occur allowing for memory disclosure or denial of service. The vulnerability is caused by an out-of-bound buffer access which can be triggered by mounting a crafted ntfs partition. The root cause is a missing consistency check after reading an MFT record : the "bytes_in_use" field should be less than the "bytes_allocated" field. When it is not, the parsing of the records proceeds into the wild.
Solution
ubuntu-pro-upgrade-ntfs-3g
References
- CVE-2021-33285
- https://attackerkb.com/topics/CVE-2021-33285
- CWE-20
- CWE-787
- DEBIAN-DSA-4971
- EUVD-EUVD-2021-19996
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2021-19996
- https://ubuntu.com/security/notices/USN-5060-1
- https://ubuntu.com/security/notices/USN-5060-2
- https://www.cve.org/CVERecord?id=CVE-2021-33285
- https://www.openwall.com/lists/oss-security/2021/08/30/1
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.