Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2022-30788
A crafted NTFS image can cause a heap-based buffer overflow in ntfs_mft_rec_alloc in NTFS-3G through 2021.8.22.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.0
EPSS Ranking
8.5%
CVSS Severity
CVSS v3 Score
7.8
CVSS v2 Score
4.6
References
https://github.com/tuxera/ntfs-3g/releases
https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-xchm-ph5h-hw4x
https://lists.debian.org/debian-lts-announce/2022/06/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JPX6OUCQKZX4PN5DQPVDUFZCOOZUX7Z/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ECDCISL24TYH4CTDFCUVF24WAKRSYF7F/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FAXFYIJWT5SHHRNPOJETM77EIMJ6ZP6I/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEXHDCUSLJD2HSPMAAVZ5AWMPUOG6UI7/
https://security.gentoo.org/glsa/202301-01
https://www.debian.org/security/2022/dsa-5160
https://github.com/tuxera/ntfs-3g/releases
https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-xchm-ph5h-hw4x
https://lists.debian.org/debian-lts-announce/2022/06/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JPX6OUCQKZX4PN5DQPVDUFZCOOZUX7Z/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ECDCISL24TYH4CTDFCUVF24WAKRSYF7F/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FAXFYIJWT5SHHRNPOJETM77EIMJ6ZP6I/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEXHDCUSLJD2HSPMAAVZ5AWMPUOG6UI7/
https://security.gentoo.org/glsa/202301-01
https://www.debian.org/security/2022/dsa-5160
Products affected by CVE-2022-30788
Tuxera
»
Ntfs-3g
»
Version:
N/A
cpe:2.3:a:tuxera:ntfs-3g:-
Tuxera
»
Ntfs-3g
»
Version:
2009.1.1
cpe:2.3:a:tuxera:ntfs-3g:2009.1.1
Tuxera
»
Ntfs-3g
»
Version:
2009.11.14
cpe:2.3:a:tuxera:ntfs-3g:2009.11.14
Tuxera
»
Ntfs-3g
»
Version:
2009.2.1
cpe:2.3:a:tuxera:ntfs-3g:2009.2.1
Tuxera
»
Ntfs-3g
»
Version:
2009.3.8
cpe:2.3:a:tuxera:ntfs-3g:2009.3.8
Tuxera
»
Ntfs-3g
»
Version:
2009.4.4
cpe:2.3:a:tuxera:ntfs-3g:2009.4.4
Tuxera
»
Ntfs-3g
»
Version:
2010.1.16
cpe:2.3:a:tuxera:ntfs-3g:2010.1.16
Tuxera
»
Ntfs-3g
»
Version:
2010.10.2
cpe:2.3:a:tuxera:ntfs-3g:2010.10.2
Tuxera
»
Ntfs-3g
»
Version:
2010.3.6
cpe:2.3:a:tuxera:ntfs-3g:2010.3.6
Tuxera
»
Ntfs-3g
»
Version:
2010.5.16
cpe:2.3:a:tuxera:ntfs-3g:2010.5.16
Tuxera
»
Ntfs-3g
»
Version:
2010.5.22
cpe:2.3:a:tuxera:ntfs-3g:2010.5.22
Tuxera
»
Ntfs-3g
»
Version:
2010.8.8
cpe:2.3:a:tuxera:ntfs-3g:2010.8.8
Tuxera
»
Ntfs-3g
»
Version:
2011.1.15
cpe:2.3:a:tuxera:ntfs-3g:2011.1.15
Tuxera
»
Ntfs-3g
»
Version:
2011.4.12
cpe:2.3:a:tuxera:ntfs-3g:2011.4.12
Tuxera
»
Ntfs-3g
»
Version:
2012.1.15
cpe:2.3:a:tuxera:ntfs-3g:2012.1.15
Tuxera
»
Ntfs-3g
»
Version:
2013.1.13
cpe:2.3:a:tuxera:ntfs-3g:2013.1.13
Tuxera
»
Ntfs-3g
»
Version:
2014.2.15
cpe:2.3:a:tuxera:ntfs-3g:2014.2.15
Tuxera
»
Ntfs-3g
»
Version:
2015.3.14
cpe:2.3:a:tuxera:ntfs-3g:2015.3.14
Tuxera
»
Ntfs-3g
»
Version:
2016.2.22
cpe:2.3:a:tuxera:ntfs-3g:2016.2.22
Tuxera
»
Ntfs-3g
»
Version:
2017.3.23
cpe:2.3:a:tuxera:ntfs-3g:2017.3.23
Tuxera
»
Ntfs-3g
»
Version:
2021.8.22
cpe:2.3:a:tuxera:ntfs-3g:2021.8.22
Debian
»
Debian Linux
»
Version:
10.0
cpe:2.3:o:debian:debian_linux:10.0
Debian
»
Debian Linux
»
Version:
11.0
cpe:2.3:o:debian:debian_linux:11.0
Debian
»
Debian Linux
»
Version:
9.0
cpe:2.3:o:debian:debian_linux:9.0
Fedoraproject
»
Fedora
»
Version:
35
cpe:2.3:o:fedoraproject:fedora:35
Fedoraproject
»
Fedora
»
Version:
36
cpe:2.3:o:fedoraproject:fedora:36
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved