中危 netatalk 安全漏洞 (CVE-2023-42464)
CVE编号
CVE-2023-42464利用情况
暂无补丁情况
官方补丁披露时间
2023-09-20漏洞描述
A Type Confusion vulnerability was found in the Spotlight RPC functions in afpd in Netatalk 3.1.x before 3.1.17. When parsing Spotlight RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the underlying protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a malicious actor may be able to fully control the value of the pointer and theoretically achieve Remote Code Execution on the host. This issue is similar to CVE-2023-34967.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | netatalk | netatalk | * | From (including) 3.1 | Up to (excluding) 3.1.17 | ||||
运行在以下环境 | |||||||||
系统 | alpine_3.18 | netatalk | * | Up to (excluding) 3.1.17-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_edge | netatalk | * | Up to (excluding) 3.1.17-r0 | |||||
运行在以下环境 | |||||||||
系统 | debian | debian_linux | 11.0 | - | |||||
运行在以下环境 | |||||||||
系统 | debian_10 | netatalk | * | Up to (excluding) 3.1.12~ds-3+deb10u4 | |||||
运行在以下环境 | |||||||||
系统 | debian_11 | netatalk | * | Up to (excluding) 3.1.12~ds-8+deb11u1 | |||||
运行在以下环境 | |||||||||
系统 | debian_sid | netatalk | * | Up to (excluding) 3.1.17~ds-1 | |||||
- 攻击路径 远程
- 攻击复杂度 容易
- 权限要求 无需权限
- 影响范围 全局影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 N/A
CWE-ID | 漏洞类型 |
CWE-843 | 使用不兼容类型访问资源(类型混淆) |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论