netatalk.io

Netatalk Security Advisory

Subject Arbitrary code execution in ad_addcomment
CVE ID# CVE-2022-0194
Date 2022/03/21 advisory published retroactively; date is approximate
Versions 3.0.0 - 3.1.12, 1.5.0 - 2.2.6
Summary Lack of validation of user-input data leads to buffer overflow and remote code execution

Description

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ad_addcomment function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.

Patch Availability

Apply the patch with git hash 4a8f6c9 to hotfix your local Netatalk deployment.

Additionally, Netatalk 3.1.13 and 2.2.7 have been released which contains the security patch. Netatalk administrators are advised to upgrade to this version or apply the patch as soon as possible.

CVSS Calculation

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (9.8)

Workaround

None.

Credits

Vulnerability found and reported by:

Theori (@theori_io)

Patch developed by:

Ralph Boehme of the Netatalk and Samba teams


Go back to the Security Policy.