Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2024.0259
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2024-0259)
Resumen:The remote host is missing an update for the 'netatalk' package(s) announced via the MGASA-2024-0259 advisory.
Descripción:Summary:
The remote host is missing an update for the 'netatalk' package(s) announced via the MGASA-2024-0259 advisory.

Vulnerability Insight:
Netatalk before 3.2.1 has an off-by-one error and resultant heap-based
buffer overflow because of setting ibuf[PASSWDLEN] to '\0' in FPLoginExt
in login in etc/uams/uams_pam.c. (CVE-2024-38439)
Netatalk before 3.2.1 has an off-by-one error, and resultant heap-based
buffer overflow and segmentation violation, because of incorrectly using
FPLoginExt in BN_bin2bn in etc/uams/uams_dhx_pam.c. The original issue
1097 report stated: 'The latest version of Netatalk (v3.2.0) contains a
security vulnerability. This vulnerability arises due to a lack of
validation for the length field after parsing user-provided data,
leading to an out-of-bounds heap write of one byte (\0). Under specific
configurations, this can result in reading metadata of the next heap
block, potentially causing a Denial of Service (DoS) under certain heap
layouts or with ASAN enabled. ... The vulnerability is located in the
FPLoginExt operation of Netatalk, in the BN_bin2bn function found in
/etc/uams/uams_dhx_pam.c ... if (!(bn = BN_bin2bn((unsigned char *)ibuf,
KEYSIZE, NULL))) ... threads ... [#0] Id 1, Name: 'afpd', stopped
0x7ffff4304e58 in ?? (), reason: SIGSEGV ... [#0] 0x7ffff4304e58 mov
BYTE PTR [r14+0x8], 0x0 ... mov rdx, QWORD PTR [rsp+0x18] ...
afp_login_ext(obj=, ibuf=0x62d000010424 '',
ibuflen=0xffffffffffff0015, rbuf=, rbuflen=out>) ... afp_over_dsi(obj=0x5555556154c0 ).'. (CVE-2024-38440)
Netatalk before 3.2.1 has an off-by-one error and resultant heap-based
buffer overflow because of setting ibuf[len] to '\0' in FPMapName in
afp_mapname in etc/afpd/directory.c. (CVE-2024-38441)

Affected Software/OS:
'netatalk' package(s) on Mageia 9.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2024-38439
https://github.com/Netatalk/netatalk/blob/90d91a9ac9a7d6132ab7620d31c8c23400949206/etc/uams/uams_pam.c#L316
https://github.com/Netatalk/netatalk/issues/1096
Common Vulnerability Exposure (CVE) ID: CVE-2024-38440
https://github.com/Netatalk/netatalk/blob/90d91a9ac9a7d6132ab7620d31c8c23400949206/etc/uams/uams_dhx_pam.c#L199-L200
https://github.com/Netatalk/netatalk/issues/1097
Common Vulnerability Exposure (CVE) ID: CVE-2024-38441
https://github.com/Netatalk/netatalk/blob/90d91a9ac9a7d6132ab7620d31c8c23400949206/etc/afpd/directory.c#L2333
https://github.com/Netatalk/netatalk/issues/1098
CopyrightCopyright (C) 2024 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.