Remote Code Execution Vulnerability in Netatalk Affected by Inadequate Data Validation
CVE-2022-43634

9.8CRITICAL

Key Information:

Vendor

Netatalk

Status
Vendor
CVE Published:
29 March 2023

What is CVE-2022-43634?

This vulnerability in Netatalk allows remote attackers to execute arbitrary code on impacted installations without needing authentication. The flaw is rooted in the dsi_writeinit function, where inadequate validation of the length of user-supplied data is performed before copying it into a fixed-length heap-based buffer. Exploitation of this vulnerability can enable an attacker to run code with root privileges, posing a significant risk to systems running affected versions.

Affected Version(s)

Netatalk 3.1.13

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Corentin BAYET (@OnlyTheDuck), Etienne HELLUY-LAFONT and Luca MORO (@johncool__) from Synacktiv
.