All the vulnerabilites related to ntfs-3g - ntfs-3g
cve-2017-0358
Vulnerability from cvelistv5
Published
2018-04-13 15:00
Modified
2024-09-17 04:15
Severity ?
EPSS score ?
Summary
Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201702-10 | vendor-advisory, x_refsource_GENTOO | |
https://www.debian.org/security/2017/dsa-3780 | vendor-advisory, x_refsource_DEBIAN | |
https://www.exploit-db.com/exploits/41240/ | exploit, x_refsource_EXPLOIT-DB | |
https://www.exploit-db.com/exploits/41356/ | exploit, x_refsource_EXPLOIT-DB | |
http://www.securityfocus.com/bid/95987 | vdb-entry, x_refsource_BID | |
https://marc.info/?l=oss-security&m=148594671929354&w=2 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2017/02/04/1 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:03:56.587Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201702-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201702-10" }, { "name": "DSA-3780", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-3780" }, { "name": "41240", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/41240/" }, { "name": "41356", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/41356/" }, { "name": "95987", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/95987" }, { "name": "[oss-security] 20170201 CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2" }, { "name": "[oss-security] 20170203 Re: CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2017/02/04/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ntfs-3g", "vendor": "ntfs-3g", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "credits": [ { "lang": "en", "value": "Jann Horn of Google Project Zero" } ], "datePublic": "2017-02-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "privilege escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-17T12:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "GLSA-201702-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201702-10" }, { "name": "DSA-3780", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-3780" }, { "name": "41240", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/41240/" }, { "name": "41356", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/41356/" }, { "name": "95987", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/95987" }, { "name": "[oss-security] 20170201 CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2" }, { "name": "[oss-security] 20170203 Re: CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2017/02/04/1" } ], "source": { "advisory": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2", "discovery": "UNKNOWN" }, "title": "ntfs-3g: Modprobe influence vulnerability via environment variables", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "DATE_PUBLIC": "2017-02-01T05:44:00.000Z", "ID": "CVE-2017-0358", "STATE": "PUBLIC", "TITLE": "ntfs-3g: Modprobe influence vulnerability via environment variables" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ntfs-3g", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "ntfs-3g" } ] } }, "credit": [ { "lang": "eng", "value": "Jann Horn of Google Project Zero" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "privilege escalation" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201702-10", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201702-10" }, { "name": "DSA-3780", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-3780" }, { "name": "41240", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41240/" }, { "name": "41356", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41356/" }, { "name": "95987", "refsource": "BID", "url": "http://www.securityfocus.com/bid/95987" }, { "name": "[oss-security] 20170201 CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables", "refsource": "MLIST", "url": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2" }, { "name": "[oss-security] 20170203 Re: CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2017/02/04/1" } ] }, "source": { "advisory": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2017-0358", "datePublished": "2018-04-13T15:00:00Z", "dateReserved": "2016-11-29T00:00:00", "dateUpdated": "2024-09-17T04:15:15.844Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-5159
Vulnerability from cvelistv5
Published
2007-10-01 00:00
Modified
2024-09-16 18:24
Severity ?
EPSS score ?
Summary
The ntfs-3g package before 1.913-2.fc7 in Fedora 7, and an ntfs-3g package in Ubuntu 7.10/Gutsy, assign incorrect permissions (setuid root) to mount.ntfs-3g, which allows local users with fuse group membership to read from and write to arbitrary block devices, possibly involving a file descriptor leak.
References
▼ | URL | Tags |
---|---|---|
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00368.html | vendor-advisory, x_refsource_FEDORA | |
https://bugzilla.redhat.com/show_bug.cgi?id=298651 | x_refsource_CONFIRM | |
https://www.redhat.com/archives/fedora-desktop-list/2007-September/msg00163.html | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/26938 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:24:42.139Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2007-2295", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00368.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=298651" }, { "name": "[fedora-desktop-list] 20070918 Re: fuse (Was Re: early-gdm redux)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-desktop-list/2007-September/msg00163.html" }, { "name": "26938", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26938" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The ntfs-3g package before 1.913-2.fc7 in Fedora 7, and an ntfs-3g package in Ubuntu 7.10/Gutsy, assign incorrect permissions (setuid root) to mount.ntfs-3g, which allows local users with fuse group membership to read from and write to arbitrary block devices, possibly involving a file descriptor leak." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-10-01T00:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "FEDORA-2007-2295", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00368.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=298651" }, { "name": "[fedora-desktop-list] 20070918 Re: fuse (Was Re: early-gdm redux)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://www.redhat.com/archives/fedora-desktop-list/2007-September/msg00163.html" }, { "name": "26938", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26938" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5159", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ntfs-3g package before 1.913-2.fc7 in Fedora 7, and an ntfs-3g package in Ubuntu 7.10/Gutsy, assign incorrect permissions (setuid root) to mount.ntfs-3g, which allows local users with fuse group membership to read from and write to arbitrary block devices, possibly involving a file descriptor leak." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2007-2295", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00368.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=298651", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=298651" }, { "name": "[fedora-desktop-list] 20070918 Re: fuse (Was Re: early-gdm redux)", "refsource": "MLIST", "url": "https://www.redhat.com/archives/fedora-desktop-list/2007-September/msg00163.html" }, { "name": "26938", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26938" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-5159", "datePublished": "2007-10-01T00:00:00Z", "dateReserved": "2007-09-30T00:00:00Z", "dateUpdated": "2024-09-16T18:24:53.206Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }