First published: Tue Dec 12 2023(Updated: )
Florent Saudel and Arnaud Gatignol discovered that Netatalk incorrectly handled certain specially crafted Spotlight requests. A remote attacker could possibly use this issue to cause heap corruption and execute arbitrary code. (CVE-2023-42464)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/netatalk | <3.1.14~ds-1ubuntu0.1 | 3.1.14~ds-1ubuntu0.1 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/netatalk | <3.1.12~ds-9ubuntu0.22.04.3 | 3.1.12~ds-9ubuntu0.22.04.3 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/netatalk | <3.1.12~ds-4ubuntu0.20.04.3 | 3.1.12~ds-4ubuntu0.20.04.3 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6552-1 is critical due to the potential for remote code execution.
To fix USN-6552-1, you need to upgrade Netatalk to the patched versions 3.1.14~ds-1ubuntu0.1, 3.1.12~ds-9ubuntu0.22.04.3, or 3.1.12~ds-4ubuntu0.20.04.3 depending on your Ubuntu version.
USN-6552-1 affects Ubuntu versions 20.04, 22.04, and 23.04 with specific vulnerable versions of Netatalk.
If you cannot upgrade, consider applying mitigating controls such as firewall rules to limit exposure to vulnerable services until you can upgrade.
Yes, a remote attacker can exploit the USN-6552-1 vulnerability without physical access to the system.