Netatalk Security Advisory
- Subject
- Arbitrary code execution in dsi_writeinit
- CVE ID
- CVE-2022-43634
- Date of Publishing
- 2023/02/06 advisory published retroactively; date is approximate
- Affected Netatalk Versions
- 3.0.0 - 3.1.14
- Summary
- Lack of validation of user-input data leads to remote code execution in the dsi_writeinit function
Description
This vulnerability allows remote attackers to execute arbitrary code on Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the dsi_writeinit function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.
Patch Availability
Apply the patch with git hash 5fcb4ab to hotfix your local Netatalk deployment.
Additionally, Netatalk 3.1.15 has been released which contains the security patch. Netatalk administrators are advised to upgrade to this version or apply the patch as soon as possible.
CVSS Calculation
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (9.8)
Workaround
None.
Credits
- Vulnerability found and reported by:
- Corentin BAYET (@OnlyTheDuck), Etienne HELLUY-LAFONT and Luca MORO (@johncool__) from Synacktiv
- Patch developed by:
- Etienne HELLUY-LAFONT from Synacktiv