This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the dsi_writeinit function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-17646.
References
Configurations
History
07 Nov 2023, 03:54
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| CPE | cpe:2.3:a:netatalk:netatalk:3.1.13:*:*:*:*:*:*:* | |
| First Time |
Netatalk netatalk
Netatalk |
17 May 2023, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
15 Apr 2023, 04:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
12 Apr 2023, 04:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
07 Apr 2023, 14:00
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Netatalk Project netatalk
Netatalk Project |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| CPE | cpe:2.3:a:netatalk_project:netatalk:3.1.13:*:*:*:*:*:*:* | |
| References | (MISC) https://github.com/Netatalk/Netatalk/pull/186 - Patch | |
| References | (MISC) https://www.zerodayinitiative.com/advisories/ZDI-23-094/ - Third Party Advisory, VDB Entry |
Information
Published : 2023-03-29 19:15
Updated : 2023-11-07 03:54
NVD link : CVE-2022-43634
Mitre link : CVE-2022-43634
JSON object : View
Products Affected
netatalk
- netatalk
CWE
CWE-122
Heap-based Buffer Overflow
