Netatalk Security Advisory
| Subject | Arbitrary code execution in ad_addcomment |
|---|---|
| CVE ID# | CVE-2022-0194 |
| Severity | Critical |
| Disclosure Date | 2022/03/22 |
| Affected Versions | 3.0.0 - 3.1.12, 1.5.0 - 2.2.6 |
| Summary | Lack of validation of user-input data leads to buffer overflow and remote code execution |
Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk without requiring authentication.
The specific flaw resides in the ad_addcomment function, where user-supplied data is not properly validated before being copied into a fixed-length stack-based buffer.
An attacker can exploit this flaw to execute code with root-level privileges.
Patch Availability
Apply the patch CVE-2022-0194,CVE-2022-23122,CVE-2022-23123,CVE-2022-23124.patch to hotfix your local Netatalk deployment.
Additionally, Netatalk 3.1.13 and 2.2.7 have been released which contains the security patch. Netatalk administrators are advised to upgrade to this version or apply the patch as soon as possible.
CVSS Calculation
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (9.8)
Workaround
None.
Credits
Vulnerability reported by:
Theori (@theori_io)
Patch developed by:
Ralph Boehme of the Netatalk and Samba teams
References
Go back to the Security Policy.