Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-23122

Опубликовано: 28 мар. 2023
Источник: ubuntu
Приоритет: high
EPSS Низкий
CVSS3: 9.8

Описание

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the setfilparams function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15837. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the setfilparams function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.]

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

not-affected

3.1.13~ds-2
esm-apps/bionic

ignored

changes too intrusive
esm-apps/focal

released

3.1.12~ds-4ubuntu0.20.04.1
esm-apps/jammy

released

3.1.12~ds-9ubuntu0.22.04.1
esm-apps/xenial

ignored

changes too intrusive
esm-infra-legacy/trusty

ignored

changes too intrusive
focal

released

3.1.12~ds-4ubuntu0.20.04.1
impish

ignored

end of life
jammy

released

3.1.12~ds-9ubuntu0.22.04.1

Показывать по

EPSS

Процентиль: 92%
0.07727
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
почти 3 года назад

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the setfilparams function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15837.

CVSS3: 9.8
debian
почти 3 года назад

This vulnerability allows remote attackers to execute arbitrary code o ...

CVSS3: 9.8
github
почти 3 года назад

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the setfilparams function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15837.

EPSS

Процентиль: 92%
0.07727
Низкий

9.8 Critical

CVSS3