Netatalk before 3.2.1 has an off-by-one error and resultant heap-based buffer overflow because of setting ibuf[PASSWDLEN] to '\0' in FPLoginExt in login in etc/uams/uams_pam.c. 2.4.1 and 3.1.19 are also fixed versions.
References
Link | Resource |
---|---|
https://github.com/Netatalk/netatalk/blob/90d91a9ac9a7d6132ab7620d31c8c23400949206/etc/uams/uams_pam.c#L316 | Product |
https://github.com/Netatalk/netatalk/issues/1096 | Broken Link Not Applicable |
https://github.com/Netatalk/netatalk/security/advisories/GHSA-8r68-857c-4rqc | Exploit Vendor Advisory |
https://netatalk.io/security/CVE-2024-38439 | Patch Vendor Advisory |
https://github.com/Netatalk/netatalk/blob/90d91a9ac9a7d6132ab7620d31c8c23400949206/etc/uams/uams_pam.c#L316 | Product |
https://github.com/Netatalk/netatalk/issues/1096 | Broken Link Not Applicable |
https://github.com/Netatalk/netatalk/security/advisories/GHSA-8r68-857c-4rqc | Exploit Vendor Advisory |
https://netatalk.io/security/CVE-2024-38439 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-06-16 13:15
Updated : 2024-11-21 09:25
NVD link : CVE-2024-38439
Mitre link : CVE-2024-38439
CVE.ORG link : CVE-2024-38439
JSON object : View
Products Affected
netatalk
- netatalk
CWE
CWE-787
Out-of-bounds Write