CVE-2019-9755
moderate-risk
Published 2019-06-05
An integer underflow issue exists in ntfs-3g 2017.3.23. A local attacker could potentially exploit this by running /bin/ntfs-3g with specially crafted arguments from a specially crafted directory to cause a heap buffer overflow, resulting in a crash or the ability to execute arbitrary code. In installations where /bin/ntfs-3g is a setuid-root binary, this could lead to a local escalation of privileges.
Do I need to act?
-
0.10% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.0/10
High
LOCAL
/ HIGH complexity
Affected Products (10)
References (10)
Third Party Advisory
https://access.redhat.com/errata/RHBA-2019:3723
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2308
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3345
Third Party Advisory
https://security.gentoo.org/glsa/202007-45
Release Notes
https://www.tuxera.com/community/release-history/
Third Party Advisory
https://access.redhat.com/errata/RHBA-2019:3723
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2308
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3345
Third Party Advisory
https://security.gentoo.org/glsa/202007-45
Release Notes
https://www.tuxera.com/community/release-history/
34
/ 100
moderate-risk
Severity
18/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
16/34 · Moderate