Netatalk before 3.1.12 is vulnerable to an out of bounds write in dsi_opensess.c. This is due to lack of bounds checking on attacker controlled data. A remote unauthenticated attacker can leverage this vulnerability to achieve arbitrary code execution.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://netatalk.sourceforge.net/3.1/ReleaseNotes3.1.12.html | release notes |
https://attachments.samba.org/attachment.cgi?id=14735 | third party advisory |
http://www.securityfocus.com/bid/106301 | vdb entry third party advisory |
https://www.exploit-db.com/exploits/46034/ | exploit vdb entry third party advisory |
https://github.com/tenable/poc/tree/master/netatalk/cve_2018_1160/ | third party advisory release notes |
https://www.exploit-db.com/exploits/46048/ | exploit vdb entry third party advisory |
https://www.synology.com/security/advisory/Synology_SA_18_62 | third party advisory |
https://www.tenable.com/security/research/tra-2018-48 | release notes exploit third party advisory |
https://www.debian.org/security/2018/dsa-4356 | third party advisory vendor advisory |
https://www.exploit-db.com/exploits/46675/ | exploit vdb entry third party advisory |
http://packetstormsecurity.com/files/152440/QNAP-Netatalk-Authentication-Bypass.html | exploit vdb entry third party advisory |