Arbitrary Code Execution in Netatalk by Netatalk Project
CVE-2022-23121
9.8CRITICAL
What is CVE-2022-23121?
This vulnerability enables remote attackers to execute arbitrary code on vulnerable Netatalk installations without requiring authentication. The core issue arises within the parse_entries function, which fails to adequately handle errors while parsing AppleDouble entries. Attackers can exploit this flaw to execute code with root privileges, potentially compromising the entire system.
Affected Version(s)
Netatalk 3.1.12
References
EPSS Score
18% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
CVSS V3.0
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
NCC Group EDG (Alex Plaskett, Cedric Halbronn, Aaron Adams)
