
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2020-10233 is a security vulnerability discovered in The Sleuth Kit (TSK) version 4.8.0 and earlier. The vulnerability was identified as a heap-based buffer over-read in the ntfs_dinode_lookup function located in fs/ntfs.c. This issue was discovered and reported by the Google Autofuzz project in February 2020 (Google Issue).
The vulnerability is classified as a heap-based buffer overflow vulnerability with a CVSS v3.1 Base Score of 9.1 (CRITICAL) and vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H. The issue specifically occurs in the ntfs_dinode_lookup function within the fs/ntfs.c file, where a heap-based buffer over-read can be triggered when processing NTFS filesystem data (NVD).
The vulnerability could allow attackers to cause a denial of service condition or potentially read sensitive information through a heap buffer overflow. The high CVSS score indicates that the vulnerability can be exploited remotely without requiring privileges or user interaction, potentially leading to high impacts on confidentiality and availability (NVD).
The vulnerability was addressed in The Sleuth Kit version 4.9.0. Users are advised to upgrade to this version or later to mitigate the risk. Fedora released security updates for versions 30, 31, and 32 to address this vulnerability (Fedora Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."