Vulnerability Name:

CVE-2021-46790 (CCN-225951)

Assigned:2021-11-25
Published:2021-11-25
Updated:2022-09-19
Summary:ntfsck in NTFS-3G through 2021.8.22 has a heap-based buffer overflow involving buffer+512*3-2.
Note: the upstream position is that ntfsck is deprecated; however, it is shipped by some Linux distributions.
CVSS v3 Severity:7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
6.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
9.8 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.6 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-787
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2021-46790

Source: MLIST
Type: Mailing List, Third Party Advisory
[oss-security] 20220526 OPEN SOURCE NTFS-3G SECURITY ADVISORY NTFS3G-SA-2022-0001

Source: XF
Type: UNKNOWN
ntfs3g-cve202146790-bo(225951)

Source: CCN
Type: NTFS-3G
Heap overflow in ntfsck #16

Source: MISC
Type: Exploit, Third Party Advisory
https://github.com/tuxera/ntfs-3g/issues/16

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2022-8f775872c9

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2022-13bc8c91b0

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2022-8fa7e5aeaf

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2022-1176b501f0

Source: DEBIAN
Type: Third Party Advisory
DSA-5160

Vulnerable Configuration:Configuration 1:
  • cpe:/a:tuxera:ntfs-3g:*:*:*:*:*:*:*:* (Version <= 2021.8.22)

  • Configuration 2:
  • cpe:/o:debian:debian_linux:10.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:11.0:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:fedoraproject:fedora:35:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:36:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:tuxera:ntfs-3g:2021.8.22:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:700
    P
    Security update for ntfs-3g_ntfsprogs (Important)
    2022-08-17
    oval:org.opensuse.security:def:5324
    P
    Security update for ntfs-3g_ntfsprogs (Important)
    2022-08-17
    oval:org.opensuse.security:def:6351
    P
    Security update for ntfs-3g_ntfsprogs (Important)
    2022-08-17
    oval:org.opensuse.security:def:3796
    P
    Security update for ntfs-3g_ntfsprogs (Important) (in QA)
    2022-08-03
    oval:org.opensuse.security:def:95429
    P
    Security update for ntfs-3g_ntfsprogs (Important) (in QA)
    2022-08-03
    BACK
    tuxera ntfs-3g *
    debian debian linux 10.0
    debian debian linux 11.0
    fedoraproject fedora 35
    fedoraproject fedora 36
    tuxera ntfs-3g 2021.8.22