Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-43634

Опубликовано: 29 мар. 2023
Источник: ubuntu
Приоритет: high
EPSS Низкий
CVSS3: 9.8

Описание

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the dsi_writeinit function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-17646.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

3.1.14~ds-1
esm-apps/bionic

ignored

changes too intrusive
esm-apps/focal

released

3.1.12~ds-4ubuntu0.20.04.1
esm-apps/jammy

released

3.1.12~ds-9ubuntu0.22.04.1
esm-apps/xenial

ignored

changes too intrusive
esm-infra-legacy/trusty

ignored

changes too intrusive
focal

released

3.1.12~ds-4ubuntu0.20.04.1
jammy

released

3.1.12~ds-9ubuntu0.22.04.1
kinetic

released

3.1.13~ds-2ubuntu0.22.10.1

Показывать по

EPSS

Процентиль: 89%
0.0462
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
почти 3 года назад

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the dsi_writeinit function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-17646.

CVSS3: 9.8
debian
почти 3 года назад

This vulnerability allows remote attackers to execute arbitrary code o ...

suse-cvrf
почти 3 года назад

Security update for netatalk

CVSS3: 9.8
github
почти 3 года назад

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the dsi_writeinit function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-17646.

CVSS3: 9.8
fstec
около 3 лет назад

Уязвимость функции dsi_writeinit реализации протокола Apple Filing Protocol Netatalk, позволяющая нарушителю выполнить произвольный код в контексте root-пользователя

EPSS

Процентиль: 89%
0.0462
Низкий

9.8 Critical

CVSS3