First published: Tue May 28 2024(Updated: )
It was discovered that Netatalk did not properly protect an SMB and AFP default configuration. A remote attacker could possibly use this issue to execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/netatalk | <3.1.12~ds-9ubuntu0.22.04.3+esm1 | 3.1.12~ds-9ubuntu0.22.04.3+esm1 |
Ubuntu Linux | =22.04 | |
All of | ||
ubuntu/netatalk | <3.1.12~ds-4ubuntu0.20.04.3+esm1 | 3.1.12~ds-4ubuntu0.20.04.3+esm1 |
Ubuntu Linux | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6786-1 is critical due to the potential for remote code execution.
USN-6786-1 affects the Netatalk package in Ubuntu versions 20.04 and 22.04.
To fix USN-6786-1, update Netatalk to version 3.1.12~ds-4ubuntu0.20.04.3+esm1 for Ubuntu 20.04 or 3.1.12~ds-9ubuntu0.22.04.3+esm1 for Ubuntu 22.04.
Yes, USN-6786-1 can be exploited remotely due to improper protection in the SMB and AFP default configuration.
After discovering USN-6786-1, immediately apply the relevant updates to mitigate the vulnerability.