First published: Tue Mar 28 2023(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the setfilparams function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.
Credit: zdi-disclosures@trendmicro.com zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netatalk Netatalk | <3.1.13 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
debian/netatalk | <=3.1.12~ds-3 | 3.1.12~ds-3+deb10u4 3.1.12~ds-8+deb11u1 3.1.18~ds-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23122 is a vulnerability that allows remote attackers to execute arbitrary code on affected installations of Netatalk.
CVE-2022-23122 has a severity rating of 9.8, which is classified as critical.
No, authentication is not required to exploit CVE-2022-23122.
Netatalk versions up to and excluding 3.1.13 are affected by CVE-2022-23122.
To fix CVE-2022-23122, it is recommended to update Netatalk to version 3.1.13 or later.