
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-35267 affects NTFS-3G versions prior to 2021.8.22, where a stack buffer overflow vulnerability was discovered in the functionality that corrects differences between the MFT (Master File Table) and MFTMirror. This vulnerability was disclosed on August 30, 2021, as part of a larger security advisory (NTFS3G-SA-2021-0001) that affected the NTFS-3G and NTFSPROGS software (GitHub Advisory, OSS Security).
The vulnerability is classified as a stack buffer overflow that occurs during the process of correcting differences between the MFT and MFTMirror components. It has been assigned a CVSS v3.1 base score of 7.8 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating local access requirements with low attack complexity (NVD). The vulnerability is categorized under CWE-787 (Out-of-bounds Write).
The vulnerability can lead to code execution or privilege escalation when the NTFS-3G binary is running with setuid-root permissions. This is particularly concerning as it could allow a local attacker to gain elevated privileges on the system (GitHub Advisory).
The primary mitigation is to upgrade NTFS-3G to version 2021.8.22 or later. Multiple Linux distributions have released security updates to address this vulnerability, including Debian (DSA-4971-1), Fedora, and Gentoo (Debian Security, Gentoo Security). No alternative workarounds were provided in the security advisories.
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."