{"id":"UBUNTU-CVE-2021-33285","details":"In NTFS-3G versions \u003c 2021.8.22, when a specially crafted NTFS attribute is supplied to the function ntfs_get_attribute_value, a heap buffer overflow can occur allowing for memory disclosure or denial of service. The vulnerability is caused by an out-of-bound buffer access which can be triggered by mounting a crafted ntfs partition. The root cause is a missing consistency check after reading an MFT record : the \"bytes_in_use\" field should be less than the \"bytes_allocated\" field. When it is not, the parsing of the records proceeds into the wild.","modified":"2026-04-22T14:45:23.858972Z","published":"2021-09-07T14:15:00Z","related":["USN-5060-1","USN-5060-2"],"upstream":["CVE-2021-33285"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-33285"},{"type":"REPORT","url":"https://www.openwall.com/lists/oss-security/2021/08/30/1"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5060-1"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5060-2"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2021-33285"}],"affected":[{"package":{"name":"ntfs-3g","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/ntfs-3g@1:2013.1.13AR.1-2ubuntu2+esm1?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2013.1.13AR.1-2ubuntu2+esm1"}]}],"versions":["1:2013.1.13AR.1-2ubuntu1","1:2013.1.13AR.1-2ubuntu2"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"ntfs-3g","binary_version":"1:2013.1.13AR.1-2ubuntu2+esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-33285.json"}},{"package":{"name":"ntfs-3g","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/ntfs-3g@1:2015.3.14AR.1-1ubuntu0.3+esm1?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2015.3.14AR.1-1ubuntu0.3+esm1"}]}],"versions":["1:2014.2.15AR.3-3","1:2015.3.14AR.1-1","1:2015.3.14AR.1-1build1","1:2015.3.14AR.1-1ubuntu0.1","1:2015.3.14AR.1-1ubuntu0.2","1:2015.3.14AR.1-1ubuntu0.3"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"ntfs-3g","binary_version":"1:2015.3.14AR.1-1ubuntu0.3+esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-33285.json"}},{"package":{"name":"ntfs-3g","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/ntfs-3g@1:2017.3.23-2ubuntu0.18.04.3?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2017.3.23-2ubuntu0.18.04.3"}]}],"versions":["1:2016.2.22AR.2-2","1:2017.3.23-2","1:2017.3.23-2ubuntu0.18.04.1","1:2017.3.23-2ubuntu0.18.04.2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libntfs-3g88","binary_version":"1:2017.3.23-2ubuntu0.18.04.3"},{"binary_name":"ntfs-3g","binary_version":"1:2017.3.23-2ubuntu0.18.04.3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-33285.json"}},{"package":{"name":"ntfs-3g","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/ntfs-3g@1:2017.3.23AR.3-3ubuntu1.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2017.3.23AR.3-3ubuntu1.1"}]}],"versions":["1:2017.3.23AR.3-3ubuntu1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libntfs-3g883","binary_version":"1:2017.3.23AR.3-3ubuntu1.1"},{"binary_name":"ntfs-3g","binary_version":"1:2017.3.23AR.3-3ubuntu1.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-33285.json"}},{"package":{"name":"ntfs-3g","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/ntfs-3g@1:2017.3.23AR.3-3ubuntu5?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2017.3.23AR.3-3ubuntu5"}]}],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libntfs-3g883","binary_version":"1:2017.3.23AR.3-3ubuntu5"},{"binary_name":"ntfs-3g","binary_version":"1:2017.3.23AR.3-3ubuntu5"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-33285.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}