Vulnerability identifier: #VU16646
Vulnerability risk: High
CVSSv4.0: 8.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber]
CVE-ID: CVE-2018-1160
CWE-ID:
CWE-787
Exploitation vector: Network
Exploit availability: Yes
Vulnerable software:
Netatalk
Server applications /
File servers (FTP/HTTP)
Vendor: Netatalk
Description
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error in dsi_opensess.c. A remote attacker can trigger an out-of-bounds write and crash the affected application or execute arbitrary code on the target system.
Mitigation
Update to version 3.1.12.
Vulnerable software versions
Netatalk: 3.0.0 - 3.1.11
External links
https://netatalk.sourceforge.net/3.1/ReleaseNotes3.1.12.html
https://attachments.samba.org/attachment.cgi?id=14735
https://github.com/tenable/poc/tree/master/netatalk/cve_2018_1160/
https://www.tenable.com/security/research/tra-2018-48
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.