Netatalk Security Advisory
Subject | Arbitrary code execution in copyapplfile |
---|---|
CVE ID# | CVE-2022-23125 |
Date | 2022/03/21 advisory published retroactively; date is approximate |
Versions | 3.0.0 - 3.1.12, 1.0 - 2.2.6 |
Summary | Lack of validation of user-input data leads to remote code execution in the copyapplfile function |
Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the copyapplfile function. When parsing the len element, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.
Patch Availability
Apply the patch with git hash d801ed4 to hotfix your local Netatalk deployment.
Additionally, Netatalk 3.1.13 and 2.2.7 have been released which contains the security patch. Netatalk administrators are advised to upgrade to this version or apply the patch as soon as possible.
CVSS Calculation
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (9.8)
Workaround
None.
Credits
Vulnerability found and reported by:
Theori (@theori_io)
Patch developed by:
Ralph Boehme of the Netatalk and Samba teams
Go back to the Security Policy.