<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Ntfs-3g — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/ntfs-3g/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 22 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/ntfs-3g/feed.xml" rel="self" type="application/rss+xml"/><item><title>NTFS-3G Heap Buffer Overflow Vulnerability (CVE-2026-40706)</title><link>https://feed.craftedsignal.io/briefs/2026-04-ntfs3g-heap-overflow/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ntfs3g-heap-overflow/</guid><description>A heap buffer overflow vulnerability exists in NTFS-3G versions 2022.10.3 before 2026.2.25 that allows for heap memory corruption by processing a crafted NTFS image with multiple ACCESS_DENIED ACEs containing WRITE_OWNER from distinct group SIDs.</description><content:encoded><![CDATA[<p>CVE-2026-40706 describes a heap buffer overflow vulnerability affecting NTFS-3G, specifically versions 2022.10.3 and earlier, before the patch in version 2026.2.25. The vulnerability lies within the <code>ntfs_build_permissions_posix()</code> function in <code>acls.c</code>. An attacker can exploit this flaw by creating a malicious NTFS image. When the affected software attempts to read this specially crafted image, a heap buffer overflow occurs. This is triggered when the software processes a security descriptor containing multiple ACCESS_DENIED Access Control Entries (ACEs), each including WRITE_OWNER permissions, and originating from distinct group Security Identifiers (SIDs). Successful exploitation allows an attacker to corrupt heap memory within the SUID-root ntfs-3g binary, potentially leading to privilege escalation or arbitrary code execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious NTFS image containing a specially designed security descriptor.</li>
<li>The security descriptor includes multiple ACCESS_DENIED ACEs.</li>
<li>Each ACE within the descriptor contains WRITE_OWNER permissions.</li>
<li>The ACEs originate from distinct group SIDs, triggering the overflow condition.</li>
<li>The attacker delivers the malicious NTFS image to a system running a vulnerable version of NTFS-3G. This may occur through physical media or network shares.</li>
<li>The victim system attempts to read the malicious NTFS image using a vulnerable NTFS-3G version, such as during a <code>stat</code>, <code>readdir</code>, or <code>open</code> operation.</li>
<li>The <code>ntfs_build_permissions_posix()</code> function is called to process the security descriptor.</li>
<li>The heap buffer overflow occurs during the processing of the malicious ACEs, corrupting heap memory. This can lead to denial of service or potentially arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40706 allows for heap memory corruption in the ntfs-3g binary, which runs with elevated privileges due to its SUID-root configuration. The observed consequence is memory corruption. Depending on the extent of the corruption, this could lead to denial-of-service or arbitrary code execution. Given the wide usage of NTFS-3G for mounting NTFS volumes on Linux and other systems, a successful exploit could affect a large number of systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade NTFS-3G to version 2026.2.25 or later to patch CVE-2026-40706 (reference: <a href="https://github.com/tuxera/ntfs-3g/releases/tag/2026.2.25">https://github.com/tuxera/ntfs-3g/releases/tag/2026.2.25</a>).</li>
<li>Monitor systems for unexpected crashes or errors related to ntfs-3g operations, which may indicate exploitation attempts. Deploy the Sigma rules below to your SIEM and tune for your environment.</li>
<li>Consider implementing stricter access controls and validation measures on NTFS images to prevent the use of malicious images (mitigation based on the vulnerability description).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ntfs-3g</category><category>heap-overflow</category><category>privilege-escalation</category><category>linux</category></item></channel></rss>