Описание
Netatalk 3.2.0 has an off-by-one error and resultant heap-based buffer overflow because of setting ibuf[PASSWDLEN] to '\0' in FPLoginExt in login in etc/uams/uams_pam.c.
Netatalk 3.2.0 has an off-by-one error and resultant heap-based buffer overflow because of setting ibuf[PASSWDLEN] to '\0' in FPLoginExt in login in etc/uams/uams_pam.c.
Ссылки
- https://github.com/Netatalk/netatalk/security/advisories/GHSA-8r68-857c-4rqc
- https://nvd.nist.gov/vuln/detail/CVE-2024-38439
- https://github.com/Netatalk/netatalk/issues/1096
- https://github.com/Netatalk/netatalk/blob/90d91a9ac9a7d6132ab7620d31c8c23400949206/etc/uams/uams_pam.c#L316
- https://lists.debian.org/debian-lts-announce/2024/11/msg00026.html
- https://netatalk.io/security/CVE-2024-38439
Связанные уязвимости
Netatalk before 3.2.1 has an off-by-one error and resultant heap-based buffer overflow because of setting ibuf[PASSWDLEN] to '\0' in FPLoginExt in login in etc/uams/uams_pam.c. 2.4.1 and 3.1.19 are also fixed versions.
Netatalk before 3.2.1 has an off-by-one error and resultant heap-based buffer overflow because of setting ibuf[PASSWDLEN] to '\0' in FPLoginExt in login in etc/uams/uams_pam.c. 2.4.1 and 3.1.19 are also fixed versions.
Netatalk before 3.2.1 has an off-by-one error and resultant heap-based ...