Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-0194

Опубликовано: 28 мар. 2023
Источник: ubuntu
Приоритет: high
CVSS3: 9.8

Описание

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ad_addcomment function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15876. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ad_addcomment function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.]

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

not-affected

3.1.13~ds-2
esm-apps/bionic

ignored

changes too intrusive
esm-apps/focal

released

3.1.12~ds-4ubuntu0.20.04.1
esm-apps/jammy

released

3.1.12~ds-9ubuntu0.22.04.1
esm-apps/xenial

ignored

changes too intrusive
esm-infra-legacy/trusty

ignored

changes too intrusive
focal

released

3.1.12~ds-4ubuntu0.20.04.1
impish

ignored

end of life
jammy

released

3.1.12~ds-9ubuntu0.22.04.1

Показывать по

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
почти 3 года назад

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ad_addcomment function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15876.

CVSS3: 9.8
debian
почти 3 года назад

This vulnerability allows remote attackers to execute arbitrary code o ...

CVSS3: 9.8
github
почти 3 года назад

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ad_addcomment function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15876.

9.8 Critical

CVSS3