mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-30 18:20:53 +00:00
32 lines
1.4 KiB
Markdown
32 lines
1.4 KiB
Markdown
![]() |
### [CVE-2018-1160](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1160)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
Netatalk before 3.1.12 is vulnerable to an out of bounds write in dsi_opensess.c. This is due to lack of bounds checking on attacker controlled data. A remote unauthenticated attacker can leverage this vulnerability to achieve arbitrary code execution.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://packetstormsecurity.com/files/152440/QNAP-Netatalk-Authentication-Bypass.html
|
||
|
- https://github.com/tenable/poc/tree/master/netatalk/cve_2018_1160/
|
||
|
- https://www.exploit-db.com/exploits/46034/
|
||
|
- https://www.exploit-db.com/exploits/46048/
|
||
|
- https://www.exploit-db.com/exploits/46675/
|
||
|
- https://www.tenable.com/security/research/tra-2018-48
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0xT11/CVE-POC
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/BloodyOrangeMan/DVRF
|
||
|
- https://github.com/ReAbout/pwn-exercise-iot
|
||
|
- https://github.com/SachinThanushka/CVE-2018-1160
|
||
|
- https://github.com/TomAPU/poc_and_exp
|
||
|
- https://github.com/WinMin/Protocol-Vul
|
||
|
- https://github.com/developer3000S/PoC-in-GitHub
|
||
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||
|
- https://github.com/hectorgie/PoC-in-GitHub
|
||
|
|