Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-38440

Опубликовано: 16 июн. 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.5

Описание

Netatalk before 3.2.1 has an off-by-one error, and resultant heap-based buffer overflow and segmentation violation, because of incorrectly using FPLoginExt in BN_bin2bn in etc/uams/uams_dhx_pam.c. The original issue 1097 report stated: 'The latest version of Netatalk (v3.2.0) contains a security vulnerability. This vulnerability arises due to a lack of validation for the length field after parsing user-provided data, leading to an out-of-bounds heap write of one byte (\0). Under specific configurations, this can result in reading metadata of the next heap block, potentially causing a Denial of Service (DoS) under certain heap layouts or with ASAN enabled. ... The vulnerability is located in the FPLoginExt operation of Netatalk, in the BN_bin2bn function found in /etc/uams/uams_dhx_pam.c ... if (!(bn = BN_bin2bn((unsigned char *)ibuf, KEYSIZE, NULL))) ... threads ... [#0] Id 1, Name: "afpd", stopped 0x7ffff4304e58 in ?? (), reason: SIGSEGV ... [#0] 0x7ffff4304e58 mov BYTE PTR [r14+0x...

РелизСтатусПримечание
devel

not-affected

esm-apps/bionic

released

2.2.6-1ubuntu0.18.04.2+esm2
esm-apps/focal

released

3.1.12~ds-4ubuntu0.20.04.4
esm-apps/jammy

released

3.1.12~ds-9ubuntu0.22.04.4
esm-apps/noble

released

3.1.18~ds-1ubuntu0.1~esm1
esm-apps/xenial

released

2.2.5-1ubuntu0.2+esm2
esm-infra-legacy/trusty

released

2.2.2-1ubuntu2.2+esm2
focal

released

3.1.12~ds-4ubuntu0.20.04.4
jammy

released

3.1.12~ds-9ubuntu0.22.04.4
mantic

ignored

end of life, was needs-triage

Показывать по

EPSS

Процентиль: 71%
0.0066
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
больше 1 года назад

Netatalk before 3.2.1 has an off-by-one error, and resultant heap-based buffer overflow and segmentation violation, because of incorrectly using FPLoginExt in BN_bin2bn in etc/uams/uams_dhx_pam.c. The original issue 1097 report stated: 'The latest version of Netatalk (v3.2.0) contains a security vulnerability. This vulnerability arises due to a lack of validation for the length field after parsing user-provided data, leading to an out-of-bounds heap write of one byte (\0). Under specific configurations, this can result in reading metadata of the next heap block, potentially causing a Denial of Service (DoS) under certain heap layouts or with ASAN enabled. ... The vulnerability is located in the FPLoginExt operation of Netatalk, in the BN_bin2bn function found in /etc/uams/uams_dhx_pam.c ... if (!(bn = BN_bin2bn((unsigned char *)ibuf, KEYSIZE, NULL))) ... threads ... [#0] Id 1, Name: "afpd", stopped 0x7ffff4304e58 in ?? (), reason: SIGSEGV ... [#0] 0x7ffff4304e58 mov BYTE PTR [r14+0x8],

CVSS3: 7.5
debian
больше 1 года назад

Netatalk before 3.2.1 has an off-by-one error, and resultant heap-base ...

CVSS3: 7.5
github
больше 1 года назад

Netatalk 3.2.0 has an off-by-one error and resultant heap-based buffer overflow because of incorrectly using FPLoginExt in BN_bin2bn in etc/uams/uams_dhx_pam.c.

CVSS3: 7.5
fstec
больше 1 года назад

Уязвимость функции BN_bin2bn (etc/uams/uams_dhx_pam.c) реализации протокола Apple Filing Protocol Netatalk, позволяющая нарушителю вызвать отказ в обслуживании

suse-cvrf
больше 1 года назад

Security update for netatalk

EPSS

Процентиль: 71%
0.0066
Низкий

7.5 High

CVSS3