2024-06-19 16:03:10 +00:00

28 lines
2.0 KiB
JSON

{
"id": "CVE-2024-38440",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-16T13:15:53.147",
"lastModified": "2024-06-19T15:15:59.913",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Netatalk 3.2.0 has an off-by-one error, and resultant heap-based buffer overflow and segmentation violation, because of incorrectly using FPLoginExt in BN_bin2bn in etc/uams/uams_dhx_pam.c. The original issue 1097 report stated: 'The latest version of Netatalk (v3.2.0) contains a security vulnerability. This vulnerability arises due to a lack of validation for the length field after parsing user-provided data, leading to an out-of-bounds heap write of one byte (\\0). Under specific configurations, this can result in reading metadata of the next heap block, potentially causing a Denial of Service (DoS) under certain heap layouts or with ASAN enabled. ... The vulnerability is located in the FPLoginExt operation of Netatalk, in the BN_bin2bn function found in /etc/uams/uams_dhx_pam.c ... if (!(bn = BN_bin2bn((unsigned char *)ibuf, KEYSIZE, NULL))) ... threads ... [#0] Id 1, Name: \"afpd\", stopped 0x7ffff4304e58 in ?? (), reason: SIGSEGV ... [#0] 0x7ffff4304e58 mov BYTE PTR [r14+0x8], 0x0 ... mov rdx, QWORD PTR [rsp+0x18] ... afp_login_ext(obj=<optimized out>, ibuf=0x62d000010424 \"\", ibuflen=0xffffffffffff0015, rbuf=<optimized out>, rbuflen=<optimized out>) ... afp_over_dsi(obj=0x5555556154c0 <obj>).'"
},
{
"lang": "es",
"value": "Netatalk 3.2.0 tiene un error uno por uno y el resultado es un desbordamiento del b\u00fafer basado en el mont\u00f3n debido al uso incorrecto de FPLoginExt en BN_bin2bn en etc/uams/uams_dhx_pam.c."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Netatalk/netatalk/blob/90d91a9ac9a7d6132ab7620d31c8c23400949206/etc/uams/uams_dhx_pam.c#L199-L200",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Netatalk/netatalk/issues/1097",
"source": "cve@mitre.org"
}
]
}