CVE-2022-23121

CRITICAL

Netatalk < 3.1.13 - Improper Exception Handling

Title source: rule
STIX 2.1

Description

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parse_entries function. The issue results from the lack of proper error handling when parsing AppleDouble entries. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15819.

Scores

CVSS v3 9.8
EPSS 0.2081
EPSS Percentile 95.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-755
Status published
Products (3)
debian/debian_linux 10.0
debian/debian_linux 11.0
netatalk/netatalk < 3.1.13
Published Mar 28, 2023
Tracked Since Feb 18, 2026