netatalk.io

Netatalk Security Advisory

Subject Arbitrary code execution in copyapplfile
CVE ID# CVE-2022-23125
Date 2022/03/21 advisory published retroactively; date is approximate
Versions 3.0.0 - 3.1.12, 1.0 - 2.2.6
Summary Lack of validation of user-input data leads to remote code execution in the copyapplfile function

Description

This vulnerability allows remote attackers to execute arbitrary code on affected Netatalk installations without requiring authentication.

The flaw resides in the copyapplfile function, where the len element is improperly handled.

The process fails to validate the length of user-supplied data before copying it into a fixed-length stack-based buffer.

An attacker can exploit this vulnerability to execute code with root-level privileges.

Patch Availability

Apply the patch with git hash d801ed4 to hotfix your local Netatalk deployment.

Additionally, Netatalk 3.1.13 and 2.2.7 have been released which contains the security patch. Netatalk administrators are advised to upgrade to this version or apply the patch as soon as possible.

CVSS Calculation

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (9.8)

Workaround

None.

Credits

Vulnerability found and reported by:

Theori (@theori_io)

Patch developed by:

Ralph Boehme of the Netatalk and Samba teams


Go back to the Security Policy.