CVE-2018-1160

Summary

CVECVE-2018-1160
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2018-12-20 21:29:00 UTC
Updated2023-09-29 11:15:00 UTC
DescriptionNetatalk before 3.1.12 is vulnerable to an out of bounds write in dsi_opensess.c. This is due to lack of bounds checking on attacker controlled data. A remote unauthenticated attacker can leverage this vulnerability to achieve arbitrary code execution.

Risk And Classification

Problem Types: CWE-787

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Debian Debian Linux 9.0 All All All
Operating System Debian Debian Linux 9.0 All All All
Application Netatalk Netatalk All All All All
Application Netatalk Project Netatalk All All All All
Application Netatalk Project Netatalk All All All All
Application Synology Diskstation Manager All All All All
Application Synology Diskstation Manager All All All All
Application Synology Router Manager All All All All
Application Synology Router Manager All All All All
Application Synology Skynas - All All All
Application Synology Skynas - All All All
Hardware Synology Vs960hd - All All All
Hardware Synology Vs960hd - All All All
Operating System Synology Vs960hd Firmware - All All All
Operating System Synology Vs960hd Firmware - All All All

References

ReferenceSourceLinkTags
QNAP Netatalk Authentication Bypass ≈ Packet Storm MISC packetstormsecurity.com Exploit, Third Party Advisory, VDB Entry
Netatalk 3.1.12 - Authentication Bypass (PoC) - Multiple dos Exploit EXPLOIT-DB www.exploit-db.com Exploit, Third Party Advisory, VDB Entry
attachments.samba.org/attachment.cgi MISC attachments.samba.org Third Party Advisory
Netatalk 3.1.12 - Authentication Bypass - Multiple remote Exploit EXPLOIT-DB www.exploit-db.com Exploit, Third Party Advisory, VDB Entry
Debian -- Security Information -- DSA-4356-1 netatalk DEBIAN www.debian.org Third Party Advisory
Netatalk Release Notes CONFIRM netatalk.sourceforge.net Release Notes
QNAP Netatalk < 3.1.12 - Authentication Bypass - Multiple remote Exploit EXPLOIT-DB www.exploit-db.com Exploit, Third Party Advisory, VDB Entry
poc/netatalk/cve_2018_1160 at master · tenable/poc · GitHub MISC github.com Release Notes, Third Party Advisory
Synology Inc. CONFIRM www.synology.com Third Party Advisory
Netatalk CVE-2018-1160 Arbitrary Code Execution Vulnerability BID www.securityfocus.com Third Party Advisory, VDB Entry
[R2] Netatalk Out-of-bounds Write - Research Advisory | Tenable® MISC www.tenable.com Exploit, Release Notes, Third Party Advisory
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 501093 Alpine Linux Security Update for netatalk
  • 505086 Alpine Linux Security Update for netatalk
  • 690248 Free Berkeley Software Distribution (FreeBSD) Security Update for netatalk3 (9c9023ff-9057-11e9-b764-00505632d232)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report