Vulnerabilites related to ntfs-3g - ntfs-3g
cve-2017-0358
Vulnerability from cvelistv5
Published
2018-04-13 15:00
Modified
2024-09-17 04:15
Severity ?
EPSS score ?
Summary
Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201702-10 | vendor-advisory, x_refsource_GENTOO | |
https://www.debian.org/security/2017/dsa-3780 | vendor-advisory, x_refsource_DEBIAN | |
https://www.exploit-db.com/exploits/41240/ | exploit, x_refsource_EXPLOIT-DB | |
https://www.exploit-db.com/exploits/41356/ | exploit, x_refsource_EXPLOIT-DB | |
http://www.securityfocus.com/bid/95987 | vdb-entry, x_refsource_BID | |
https://marc.info/?l=oss-security&m=148594671929354&w=2 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2017/02/04/1 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:03:56.587Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201702-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201702-10" }, { "name": "DSA-3780", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-3780" }, { "name": "41240", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/41240/" }, { "name": "41356", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/41356/" }, { "name": "95987", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/95987" }, { "name": "[oss-security] 20170201 CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2" }, { "name": "[oss-security] 20170203 Re: CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2017/02/04/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ntfs-3g", "vendor": "ntfs-3g", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "credits": [ { "lang": "en", "value": "Jann Horn of Google Project Zero" } ], "datePublic": "2017-02-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "privilege escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-17T12:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "GLSA-201702-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201702-10" }, { "name": "DSA-3780", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-3780" }, { "name": "41240", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/41240/" }, { "name": "41356", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/41356/" }, { "name": "95987", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/95987" }, { "name": "[oss-security] 20170201 CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2" }, { "name": "[oss-security] 20170203 Re: CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2017/02/04/1" } ], "source": { "advisory": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2", "discovery": "UNKNOWN" }, "title": "ntfs-3g: Modprobe influence vulnerability via environment variables", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "DATE_PUBLIC": "2017-02-01T05:44:00.000Z", "ID": "CVE-2017-0358", "STATE": "PUBLIC", "TITLE": "ntfs-3g: Modprobe influence vulnerability via environment variables" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ntfs-3g", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "ntfs-3g" } ] } }, "credit": [ { "lang": "eng", "value": "Jann Horn of Google Project Zero" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "privilege escalation" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201702-10", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201702-10" }, { "name": "DSA-3780", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-3780" }, { "name": "41240", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41240/" }, { "name": "41356", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41356/" }, { "name": "95987", "refsource": "BID", "url": "http://www.securityfocus.com/bid/95987" }, { "name": "[oss-security] 20170201 CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables", "refsource": "MLIST", "url": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2" }, { "name": "[oss-security] 20170203 Re: CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2017/02/04/1" } ] }, "source": { "advisory": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2017-0358", "datePublished": "2018-04-13T15:00:00Z", "dateReserved": "2016-11-29T00:00:00", "dateUpdated": "2024-09-17T04:15:15.844Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-5159
Vulnerability from cvelistv5
Published
2007-10-01 00:00
Modified
2024-09-16 18:24
Severity ?
EPSS score ?
Summary
The ntfs-3g package before 1.913-2.fc7 in Fedora 7, and an ntfs-3g package in Ubuntu 7.10/Gutsy, assign incorrect permissions (setuid root) to mount.ntfs-3g, which allows local users with fuse group membership to read from and write to arbitrary block devices, possibly involving a file descriptor leak.
References
▼ | URL | Tags |
---|---|---|
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00368.html | vendor-advisory, x_refsource_FEDORA | |
https://bugzilla.redhat.com/show_bug.cgi?id=298651 | x_refsource_CONFIRM | |
https://www.redhat.com/archives/fedora-desktop-list/2007-September/msg00163.html | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/26938 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:24:42.139Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2007-2295", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00368.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=298651" }, { "name": "[fedora-desktop-list] 20070918 Re: fuse (Was Re: early-gdm redux)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-desktop-list/2007-September/msg00163.html" }, { "name": "26938", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26938" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The ntfs-3g package before 1.913-2.fc7 in Fedora 7, and an ntfs-3g package in Ubuntu 7.10/Gutsy, assign incorrect permissions (setuid root) to mount.ntfs-3g, which allows local users with fuse group membership to read from and write to arbitrary block devices, possibly involving a file descriptor leak." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-10-01T00:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "FEDORA-2007-2295", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00368.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=298651" }, { "name": "[fedora-desktop-list] 20070918 Re: fuse (Was Re: early-gdm redux)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://www.redhat.com/archives/fedora-desktop-list/2007-September/msg00163.html" }, { "name": "26938", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26938" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5159", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ntfs-3g package before 1.913-2.fc7 in Fedora 7, and an ntfs-3g package in Ubuntu 7.10/Gutsy, assign incorrect permissions (setuid root) to mount.ntfs-3g, which allows local users with fuse group membership to read from and write to arbitrary block devices, possibly involving a file descriptor leak." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2007-2295", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00368.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=298651", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=298651" }, { "name": "[fedora-desktop-list] 20070918 Re: fuse (Was Re: early-gdm redux)", "refsource": "MLIST", "url": "https://www.redhat.com/archives/fedora-desktop-list/2007-September/msg00163.html" }, { "name": "26938", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26938" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-5159", "datePublished": "2007-10-01T00:00:00Z", "dateReserved": "2007-09-30T00:00:00Z", "dateUpdated": "2024-09-16T18:24:53.206Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2007-10-01 05:17
Modified
2024-11-21 00:37
Severity ?
Summary
The ntfs-3g package before 1.913-2.fc7 in Fedora 7, and an ntfs-3g package in Ubuntu 7.10/Gutsy, assign incorrect permissions (setuid root) to mount.ntfs-3g, which allows local users with fuse group membership to read from and write to arbitrary block devices, possibly involving a file descriptor leak.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:fedora:7:*:*:*:*:*:*:*", "matchCriteriaId": "EE2027FA-357A-4BE3-9043-6DE8307C040A", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:ntfs-3g:ntfs-3g:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED638D1A-D4AB-4070-8D29-C18741D9F98F", "versionEndIncluding": "1.913-1.fc7", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "06FD8602-7069-41C6-B65C-84928EDCE2D6", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:ntfs-3g:ntfs-3g:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBCA444C-CDF1-44A5-A00B-4258F8657B09", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ntfs-3g package before 1.913-2.fc7 in Fedora 7, and an ntfs-3g package in Ubuntu 7.10/Gutsy, assign incorrect permissions (setuid root) to mount.ntfs-3g, which allows local users with fuse group membership to read from and write to arbitrary block devices, possibly involving a file descriptor leak." }, { "lang": "es", "value": "El paquete ntfs-3g anterior a 1.913-2.fc7 en Fedora 7, y en el paquete kntfs-3g package en Ubuntu 7.10/Gutsy, asigna de forma incorrecta los permisos (setuid root) en mount.ntfs-3g, el cual permite a usuarios locales siendo miembros de fuse leer y escribir dispositivos de bloque de su elecci\u00f3n, posiblemente afectando a un descriptor de fichero d\u00e9bil." } ], "id": "CVE-2007-5159", "lastModified": "2024-11-21T00:37:16.480", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-10-01T05:17:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26938" }, { "source": "cve@mitre.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=298651" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-desktop-list/2007-September/msg00163.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00368.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26938" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=298651" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-desktop-list/2007-September/msg00163.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00368.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }