Netatalk Security Advisory
| Subject | Information leak in get_finderinfo |
|---|---|
| CVE ID# | CVE-2022-23124 |
| Severity | Medium |
| Disclosure Date | 2022/03/22 |
| Affected Versions | 3.0.0 - 3.1.12 |
| Summary | Lack of validation of user-input data in the get_finderinfo function allows for reading past of allocated buffer |
Description
This vulnerability allows remote attackers to disclose sensitive information on affected Netatalk installations without requiring authentication.
The flaw resides in the get_finderinfo method, where user-supplied data is not properly validated, leading to a read past the end of an allocated buffer.
An attacker can combine this issue with other vulnerabilities to execute arbitrary code with root-level privileges.
Patch Availability
Apply the patch CVE-2022-0194,CVE-2022-23122,CVE-2022-23123,CVE-2022-23124.patch to hotfix your local Netatalk deployment.
Additionally, Netatalk 3.1.13 has been released which contains the security patch. Netatalk administrators are advised to upgrade to this version or apply the patch as soon as possible.
CVSS Calculation
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N (5.3)
Workaround
None.
Credits
Vulnerability reported by:
Theori (@theori_io)
Patch developed by:
Ralph Boehme of the Netatalk and Samba teams
References
Go back to the Security Policy.