CVE Vulnerabilities

CVE-2019-9755

Integer Underflow (Wrap or Wraparound)

Published: Jun 05, 2019 | Modified: Nov 21, 2024
CVSS 3.x
7
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
4.4 MEDIUM
AV:L/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
3.3 LOW
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Ubuntu
HIGH
root.io logo minimus.io logo echo.ai logo

An integer underflow issue exists in ntfs-3g 2017.3.23. A local attacker could potentially exploit this by running /bin/ntfs-3g with specially crafted arguments from a specially crafted directory to cause a heap buffer overflow, resulting in a crash or the ability to execute arbitrary code. In installations where /bin/ntfs-3g is a setuid-root binary, this could lead to a local escalation of privileges.

Weakness

The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.

Affected Software

NameVendorStart VersionEnd Version
Ntfs-3gTuxera2017.3.23 (including)2017.3.23 (including)
Advanced Virtualization for RHEL 8.1.0RedHatvirt:8.1-8010020190927171011.cdc1202b*
Advanced Virtualization for RHEL 8.1.0RedHatvirt-devel:8.1-8010020190927171011.cdc1202b*
Red Hat Enterprise Linux 7RedHatlibguestfs-winsupport-0:7.2-3.el7*
Red Hat Enterprise Linux 8RedHatvirt-devel:rhel-8010020190916153839.cdc1202b*
Red Hat Enterprise Linux 8RedHatvirt:rhel-8010020190916153839.cdc1202b*
Ntfs-3gUbuntubionic*
Ntfs-3gUbuntucosmic*
Ntfs-3gUbuntudevel*
Ntfs-3gUbuntuesm-infra-legacy/trusty*
Ntfs-3gUbuntuesm-infra/bionic*
Ntfs-3gUbuntuesm-infra/xenial*
Ntfs-3gUbuntuprecise/esm*
Ntfs-3gUbuntutrusty*
Ntfs-3gUbuntutrusty/esm*
Ntfs-3gUbuntuupstream*
Ntfs-3gUbuntuxenial*

References