CVE-2021-35266

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-35266
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-35266.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-35266
Aliases
Related
Published
2021-09-07T15:15:07Z
Modified
2024-09-18T03:15:03.419638Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In NTFS-3G versions < 2021.8.22, when a specially crafted NTFS inode pathname is supplied in an NTFS image a heap buffer overflow can occur resulting in memory disclosure, denial of service and even code execution.

References

Affected packages

Debian:11 / ntfs-3g

Package

Name
ntfs-3g
Purl
pkg:deb/debian/ntfs-3g?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2017.3.23AR.3-4+deb11u1

Affected versions

1:2017.*

1:2017.3.23AR.3-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / ntfs-3g

Package

Name
ntfs-3g
Purl
pkg:deb/debian/ntfs-3g?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2021.8.22-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / ntfs-3g

Package

Name
ntfs-3g
Purl
pkg:deb/debian/ntfs-3g?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2021.8.22-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/tuxera/ntfs-3g

Affected ranges

Type
GIT
Repo
https://github.com/tuxera/ntfs-3g
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

2011_3_26
N0_20061031_BETA
N0_20061115_BETA
N0_20061212_BETA
N0_20061218_BETA
N0_20070102_BETA
N0_20070116_BETA
N0_20070118_BETA
N0_20070207_RC1
N1_0
N1_1004
N1_1030
N1_1104
N1_1120
N1_2121_RC
N1_2125_RC
N1_2129
N1_2216
N1_2310
N1_2412
N1_2506
N1_2531
N1_2712
N1_2812
N1_2918
N1_2926_RC
N1_320_RC
N1_328
N1_411_RC
N1_416
N1_417
N1_5012
N1_5130
N1_516
N1_5222_RC
N1_612_RC
N1_616
N1_710
N1_810
N1_826
N1_910_RC
N1_913
N2006_11_07_011225
N2006_11_08_220332
N2006_11_08_233131
N2006_11_11_005720
N2006_11_11_010308
N2006_11_11_013125
N2006_11_11_220751
N2006_11_14_010037
N2006_11_14_220946
N2008_06_30_143340
N2008_07_12_182213
N2008_07_17_180654
N2008_08_11_185232
N2008_09_18_235522
N2008_09_19_001329
N2008_10_11_154321
N2008_10_22_165845
N2008_12_21_190200
N2009_02_12_002656
N2009_04_02_130250
N2009_10_03_095644
N2009_10_03_104125
N2009_1_1
N2009_2_1
N2009_3_8
N2009_4_4
N2010_10_2
N2010_2_6
N2010_3_6
N2010_5_15
N2010_5_16
N2010_5_22
N2010_6_30_RC
N2010_6_31_RC
N2010_7_23_RC
N2010_8_8
PERMISSION_HANDLING_BASE_20070925
R2009_10_5_RC
start
v2011_10_9_RC
v2011_3_26
v2011_3_28_RC
v2011_4_10
v2011_4_11
v2011_4_12
v2012_1_15
v2013_1_13

2014.*

2014.2.15

2015.*

2015.3.13
2015.3.14
2015.3.5

2016.*

2016.2.15
2016.2.22

2017.*

2017.2.15
2017.3.23

2021.*

2021.5.19
2021.8.14