ALT-PU-2018-2964-1
Closed vulnerabilities
Published: 2018-12-20
BDU:2019-01250
Уязвимость реализации протокола Netatalk, связанная с записью за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
Severity: CRITICAL (9.8)
Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References:
Published: 2018-12-21
Modified: 2025-01-14
Modified: 2025-01-14
CVE-2018-1160
Netatalk before 3.1.12 is vulnerable to an out of bounds write in dsi_opensess.c. This is due to lack of bounds checking on attacker controlled data. A remote unauthenticated attacker can leverage this vulnerability to achieve arbitrary code execution.
Severity: CRITICAL (9.8)
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References:
- http://netatalk.sourceforge.net/3.1/ReleaseNotes3.1.12.html
- http://netatalk.sourceforge.net/3.1/ReleaseNotes3.1.12.html
- http://packetstormsecurity.com/files/152440/QNAP-Netatalk-Authentication-Bypass.html
- http://packetstormsecurity.com/files/152440/QNAP-Netatalk-Authentication-Bypass.html
- 106301
- 106301
- https://attachments.samba.org/attachment.cgi?id=14735
- https://attachments.samba.org/attachment.cgi?id=14735
- https://github.com/tenable/poc/tree/master/netatalk/cve_2018_1160/
- https://github.com/tenable/poc/tree/master/netatalk/cve_2018_1160/
- DSA-4356
- DSA-4356
- 46034
- 46034
- 46048
- 46048
- 46675
- 46675
- https://www.synology.com/security/advisory/Synology_SA_18_62
- https://www.synology.com/security/advisory/Synology_SA_18_62
- https://www.tenable.com/security/research/tra-2018-48
- https://www.tenable.com/security/research/tra-2018-48