CVE-2022-0194
Summary
| CVE | CVE-2022-0194 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-03-28 19:15:00 UTC |
| Updated | 2023-11-22 21:02:00 UTC |
| Description | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ad_addcomment function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15876. |
NVD Known Affected Configurations (CPE 2.3)
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 181789 Debian Security Update for netatalk (DLA 3426-1)
- 199403 Ubuntu Security Notification for Netatalk Vulnerabilities (USN-6146-1)
- 502549 Alpine Linux Security Update for netatalk
- 505087 Alpine Linux Security Update for netatalk
- 6000181 Debian Security Update for netatalk (DSA 5503-1)
- 710785 Gentoo Linux Netatalk Multiple Vulnerabilities including root Remote Code Execution (RCE) (GLSA 202311-02)