SB2022060845 - Fedora 36 update for ntfs-3g 



SB2022060845 - Fedora 36 update for ntfs-3g

Published: June 8, 2022

Security Bulletin ID SB2022060845
Severity
Low
Patch available
YES
Number of vulnerabilities 8
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 8 secuirty vulnerabilities.


1) Code Injection (CVE-ID: CVE-2022-30783)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to a flaw when using libfuse-lite. A local administrator can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Heap-based buffer overflow (CVE-ID: CVE-2022-30784)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in ntfs_get_attribute_value. A remote administrator can use a specially crafted NTFS image file, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


3) Code Injection (CVE-ID: CVE-2022-30785)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to an arbitrary memory read and write operations issue when using libfuse-lite. A local administrator can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


4) Heap-based buffer overflow (CVE-ID: CVE-2022-30786)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in ntfs_names_full_collate. A remote administrator can use a specially crafted NTFS image file, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


5) Integer underflow (CVE-ID: CVE-2022-30787)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to integer underflow in fuse_lib_readdir when using libfuse-lite. A local administrator can send a specially crafted request to the affected application, trigger integer underflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


6) Heap-based buffer overflow (CVE-ID: CVE-2022-30788)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in ntfs_mft_rec_alloc. A remote administrator can use a specially crafted NTFS image file, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


7) Heap-based buffer overflow (CVE-ID: CVE-2022-30789)

The vulnerability allows a local attacker to execute arbitrary code with escalated privileges.

The vulnerability exists due to a boundary error in the ntfs_check_log_client_array in NTFS-3G. A local attacker can mount a specially crafted NTFS image, trigger a heap-based buffer overflow and execute arbitrary code with escalated privileges.


8) Heap-based buffer overflow (CVE-ID: CVE-2021-46790)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in the ntfsck in NTFS-3G when processing specially crafted NTFS filesystem. A local user can mount a malicious NTFS filesystem, trigger a heap-based buffer overflow and execute arbitrary code with elevated privileges.


Remediation

Install update from vendor's website.