
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was identified in NTFS-3G versions prior to 2021.8.22, tracked as CVE-2021-39253. The vulnerability involves an out-of-bounds read in the ntfsrunlistsmerge_i function when processing a crafted NTFS image (NTFS3G Advisory, Debian Security).
The vulnerability is characterized by an out-of-bounds read condition that occurs in the ntfsrunlistsmerge_i function when processing specially crafted NTFS images. The issue was discovered in August 2021 and was assigned a moderate severity rating (NTFS3G Advisory).
The vulnerability could potentially allow an attacker using a maliciously crafted NTFS-formatted image file or external storage to execute arbitrary privileged code. This is particularly concerning if the attacker has local access and the ntfs-3g binary is setuid root, or if they have physical access to an external port on a computer configured to run the ntfs-3g binary (NTFS3G Advisory).
The vulnerability was fixed in NTFS-3G version 2021.8.22. Users are strongly recommended to upgrade to this version or later. No alternative workarounds are available (NTFS3G Advisory, Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."