Page 7 of 32 results (0.005 seconds)

CVSS: 7.0EPSS: 0%CPEs: 10EXPL: 0

An integer underflow issue exists in ntfs-3g 2017.3.23. A local attacker could potentially exploit this by running /bin/ntfs-3g with specially crafted arguments from a specially crafted directory to cause a heap buffer overflow, resulting in a crash or the ability to execute arbitrary code. In installations where /bin/ntfs-3g is a setuid-root binary, this could lead to a local escalation of privileges. Existe un problema de desbordamiento de enteros en ntfs-3g versión 2017.3.23. Un atacante local podría potencialmente aprovechar esto mediante la ejecución del archivo /bin/ntfs-3g con argumentos especialmente creados desde un directorio especialmente creado para causar un desbordamiento del búfer de la pila, lo que resulta en un bloqueo o la capacidad de ejecutar código arbitrario. • https://access.redhat.com/errata/RHBA-2019:3723 https://access.redhat.com/errata/RHSA-2019:2308 https://access.redhat.com/errata/RHSA-2019:3345 https://security.gentoo.org/glsa/202007-45 https://www.tuxera.com/community/release-history https://access.redhat.com/security/cve/CVE-2019-9755 https://bugzilla.redhat.com/show_bug.cgi?id=1691624 • CWE-122: Heap-based Buffer Overflow CWE-191: Integer Underflow (Wrap or Wraparound) CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 3

Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation. Jann Horn, de Google Project Zero, descubrió que NTFS-3G, un controlador NTFS de lectura-escritura para FUSE, no limpia en profundidad el entorno antes de ejecutar modprobe con privilegios elevados. Un usuario local puede aprovecharse de este error para escalar privilegios locales a root. NTFS-3G has an issue where modprobe is executed with an unsanitized environment. • https://www.exploit-db.com/exploits/41356 https://www.exploit-db.com/exploits/41240 http://www.openwall.com/lists/oss-security/2017/02/04/1 http://www.securityfocus.com/bid/95987 https://marc.info/?l=oss-security&m=148594671929354&w=2 https://security.gentoo.org/glsa/201702-10 https://www.debian.org/security/2017/dsa-3780 • CWE-269: Improper Privilege Management •