Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-23121

Опубликовано: 28 мар. 2023
Источник: nvd
CVSS3: 9.8
CVSS3: 9.8
EPSS Средний

Описание

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parse_entries function. The issue results from the lack of proper error handling when parsing AppleDouble entries. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15819.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:netatalk:netatalk:*:*:*:*:*:*:*:*
Версия до 3.1.13 (исключая)
Конфигурация 2

Одно из

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

EPSS

Процентиль: 95%
0.18577
Средний

9.8 Critical

CVSS3

9.8 Critical

CVSS3

Дефекты

CWE-755
CWE-755

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 3 года назад

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parse_entries function. The issue results from the lack of proper error handling when parsing AppleDouble entries. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15819. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parse_entries function. The issue results from the lack of proper error handling when parsing AppleDouble entries. An attacker can leverage this vulnerability to execute code in the context of root.]

CVSS3: 9.8
debian
почти 3 года назад

This vulnerability allows remote attackers to execute arbitrary code o ...

CVSS3: 9.8
github
почти 3 года назад

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parse_entries function. The issue results from the lack of proper error handling when parsing AppleDouble entries. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15819.

suse-cvrf
почти 4 года назад

Security update for netatalk

EPSS

Процентиль: 95%
0.18577
Средний

9.8 Critical

CVSS3

9.8 Critical

CVSS3

Дефекты

CWE-755
CWE-755