| CVE ID | CVE-2022-23121 |
| CVSS SCORE | 9.8, AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| AFFECTED VENDORS |
Netatalk |
| AFFECTED PRODUCTS |
Netatalk |
| VULNERABILITY DETAILS |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parse_entries function. The issue results from the lack of proper error handling when parsing AppleDouble entries. An attacker can leverage this vulnerability to execute code in the context of root. |
| ADDITIONAL DETAILS |
Netatalk has issued an update to correct this vulnerability. More details can be found at:
https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html |
| DISCLOSURE TIMELINE |
|
| CREDIT | NCC Group EDG (Alex Plaskett, Cedric Halbronn, Aaron Adams) |