Netatalk through 3.1.13 has an afp_getappl heap-based buffer overflow resulting in code execution via a crafted .appl file. This provides remote root access on some platforms such as FreeBSD (used for TrueNAS).
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
28 Dec 2023, 15:12
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.debian.org/debian-lts-announce/2023/05/msg00018.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZYWSGVA6WXREMB6PV56HAHKU7R6KPOP/ - Mailing List | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GEAFLA5L2SHOUFBAGUXIF2TZLGBXGJKT/ - Mailing List | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SG6WZW5LXFVH3P7ZVZRGHUVJEMEFKQLI/ - Mailing List | |
References | () https://security.gentoo.org/glsa/202311-02 - Issue Tracking, Third Party Advisory | |
References | () https://www.debian.org/security/2023/dsa-5503 - Third Party Advisory | |
First Time |
Debian
Fedoraproject Debian debian Linux Fedoraproject fedora |
|
CPE | cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
07 Nov 2023, 03:54
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
01 Nov 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Sep 2023, 11:15
Type | Values Removed | Values Added |
---|---|---|
First Time |
Netatalk netatalk
Netatalk |
|
CPE | cpe:2.3:a:netatalk:netatalk:*:*:*:*:*:*:*:* |
21 Sep 2023, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 May 2023, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 Apr 2023, 04:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Apr 2023, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Nov 2022, 16:16
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.14.html - Broken Link | |
References | (MISC) https://rushbnt.github.io/bug%20analysis/netatalk-0day/ - Exploit, Third Party Advisory | |
References | (MISC) https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html - Release Notes, Third Party Advisory | |
References | (MISC) https://sourceforge.net/projects/netatalk/files/netatalk/ - Release Notes, Third Party Advisory | |
First Time |
Netatalk Project
Netatalk Project netatalk |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CPE | cpe:2.3:a:netatalk_project:netatalk:*:*:*:*:*:*:*:* | |
CWE | CWE-787 |
12 Nov 2022, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-11-12 05:15
Updated : 2023-12-28 15:12
NVD link : CVE-2022-45188
Mitre link : CVE-2022-45188
CVE.ORG link : CVE-2022-45188
JSON object : View
Products Affected
fedoraproject
- fedora
netatalk
- netatalk
debian
- debian_linux
CWE
CWE-787
Out-of-bounds Write