Lucene search

K
nvd[email protected]NVD:CVE-2022-23124
HistoryMar 28, 2023 - 7:15 p.m.

CVE-2022-23124

2023-03-2819:15:10
CWE-125
web.nvd.nist.gov
2
netatalk
remote attackers
sensitive information disclosure
authentication bypass
user-supplied data
arbitrary code execution
root context
zdi-can-15870

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

High

0.024 Low

EPSS

Percentile

90.0%

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the get_finderinfo method. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-15870.

Affected configurations

NVD
Node
netatalknetatalkRange<3.1.13
Node
debiandebian_linuxMatch10.0
OR
debiandebian_linuxMatch11.0

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

High

0.024 Low

EPSS

Percentile

90.0%