Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:1184-1

Опубликовано: 13 апр. 2022
Источник: suse-cvrf

Описание

Security update for netatalk

This update for netatalk fixes the following issues:

  • CVE-2022-23125: Fixed remote arbitrary code execution related to copyapplfile().
  • CVE-2022-23121: Fixed remote arbitrary code execution related to parse_entries().
  • CVE-2021-31439: Fixed remote arbitrary code execution related to dsi_stream_receive().

Список пакетов

SUSE Linux Enterprise Software Development Kit 12 SP5
libatalk12-3.1.0-3.8.1
netatalk-3.1.0-3.8.1
netatalk-devel-3.1.0-3.8.1
SUSE Linux Enterprise Workstation Extension 12 SP5
libatalk12-3.1.0-3.8.1
netatalk-3.1.0-3.8.1

Описание

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology DiskStation Manager. Authentication is not required to exploit this vulnerablity. The specific flaw exists within the processing of DSI structures in Netatalk. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12326.


Затронутые продукты
SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1
SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1
SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1
SUSE Linux Enterprise Workstation Extension 12 SP5:libatalk12-3.1.0-3.8.1

Ссылки

Описание

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parse_entries function. The issue results from the lack of proper error handling when parsing AppleDouble entries. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15819.


Затронутые продукты
SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1
SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1
SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1
SUSE Linux Enterprise Workstation Extension 12 SP5:libatalk12-3.1.0-3.8.1

Ссылки

Описание

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the copyapplfile function. When parsing the len element, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15869.


Затронутые продукты
SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1
SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1
SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1
SUSE Linux Enterprise Workstation Extension 12 SP5:libatalk12-3.1.0-3.8.1

Ссылки