Description
Netatalk through 3.1.13 has an afp_getappl heap-based buffer overflow resulting in code execution via a crafted .appl file. This provides remote root access on some platforms such as FreeBSD (used for TrueNAS).
References (10)
Core 10
Core References
Release Notes, Third Party Advisory
https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
Exploit, Third Party Advisory
https://rushbnt.github.io/bug%20analysis/netatalk-0day/
Release Notes, Third Party Advisory
https://sourceforge.net/projects/netatalk/files/netatalk/
Mailing List vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZYWSGVA6WXREMB6PV56HAHKU7R6KPOP/
Mailing List vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SG6WZW5LXFVH3P7ZVZRGHUVJEMEFKQLI/
Mailing List vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GEAFLA5L2SHOUFBAGUXIF2TZLGBXGJKT/
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2023/05/msg00018.html
Third Party Advisory vendor-advisory
https://www.debian.org/security/2023/dsa-5503
Issue Tracking, Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/202311-02
Scores
CVSS v3
7.8
EPSS
0.0008
EPSS Percentile
22.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-122
CWE-787
Status
published
Products (6)
debian/debian_linux
10.0
debian/debian_linux
11.0
fedoraproject/fedora
36
fedoraproject/fedora
37
fedoraproject/fedora
38
netatalk/netatalk
< 3.1.13
Published
Nov 12, 2022
Tracked Since
Feb 18, 2026