cve-2023-42464
Vulnerability from cvelistv5
Published
2023-09-20 00:00
Modified
2024-08-02 19:23
Severity ?
EPSS score ?
Summary
A Type Confusion vulnerability was found in the Spotlight RPC functions in afpd in Netatalk 3.1.x before 3.1.17. When parsing Spotlight RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the underlying protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a malicious actor may be able to fully control the value of the pointer and theoretically achieve Remote Code Execution on the host. This issue is similar to CVE-2023-34967.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/Netatalk/netatalk/issues/486 | Issue Tracking, Patch, Vendor Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2023/09/msg00031.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://netatalk.io/security/CVE-2023-42464 | ||
cve@mitre.org | https://netatalk.sourceforge.io/ | Product | |
cve@mitre.org | https://netatalk.sourceforge.io/3.1/htmldocs/afpd.8.html | Product | |
cve@mitre.org | https://netatalk.sourceforge.io/CVE-2023-42464.php | Patch, Vendor Advisory | |
cve@mitre.org | https://www.debian.org/security/2023/dsa-5503 | Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:23:39.184Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://netatalk.sourceforge.io/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/Netatalk/netatalk/issues/486" }, { "name": "DSA-5503", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5503" }, { "name": "[debian-lts-announce] 20230925 [SECURITY] [DLA 3584-1] netatalk security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00031.html" }, { "tags": [ "x_transferred" ], "url": "https://netatalk.sourceforge.io/CVE-2023-42464.php" }, { "tags": [ "x_transferred" ], "url": "https://netatalk.sourceforge.io/3.1/htmldocs/afpd.8.html" }, { "tags": [ "x_transferred" ], "url": "https://netatalk.io/security/CVE-2023-42464" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A Type Confusion vulnerability was found in the Spotlight RPC functions in afpd in Netatalk 3.1.x before 3.1.17. When parsing Spotlight RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the underlying protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a malicious actor may be able to fully control the value of the pointer and theoretically achieve Remote Code Execution on the host. This issue is similar to CVE-2023-34967." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-01T08:19:48.643325", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://netatalk.sourceforge.io/" }, { "url": "https://github.com/Netatalk/netatalk/issues/486" }, { "name": "DSA-5503", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5503" }, { "name": "[debian-lts-announce] 20230925 [SECURITY] [DLA 3584-1] netatalk security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00031.html" }, { "url": "https://netatalk.sourceforge.io/CVE-2023-42464.php" }, { "url": "https://netatalk.sourceforge.io/3.1/htmldocs/afpd.8.html" }, { "url": "https://netatalk.io/security/CVE-2023-42464" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-42464", "datePublished": "2023-09-20T00:00:00", "dateReserved": "2023-09-11T00:00:00", "dateUpdated": "2024-08-02T19:23:39.184Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-42464\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2023-09-20T15:15:11.817\",\"lastModified\":\"2024-07-01T09:15:06.080\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A Type Confusion vulnerability was found in the Spotlight RPC functions in afpd in Netatalk 3.1.x before 3.1.17. When parsing Spotlight RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the underlying protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a malicious actor may be able to fully control the value of the pointer and theoretically achieve Remote Code Execution on the host. This issue is similar to CVE-2023-34967.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 una vulnerabilidad de Confusi\u00f3n de Tipos en las funciones Spotlight RPC en afpd en Netatalk 3.1.x anterior a 3.1.17. Al analizar paquetes RPC de Spotlight, una estructura de datos codificada es un diccionario de estilo clave-valor donde las claves son cadenas de caracteres y los valores pueden ser cualquiera de los tipos admitidos en el protocolo subyacente. Debido a la falta de verificaci\u00f3n de tipos en las personas que llaman a la funci\u00f3n dalloc_value_for_key(), que devuelve el objeto asociado con una clave, un actor malicioso puede controlar completamente el valor del puntero y, en teor\u00eda, lograr la Ejecuci\u00f3n Remota de C\u00f3digo en el anfitri\u00f3n. Este problema es similar a CVE-2023-34967.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-843\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netatalk:netatalk:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.1\",\"versionEndExcluding\":\"3.1.17\",\"matchCriteriaId\":\"D77B6D18-12B6-4124-B5A9-D202B7521EB7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]}],\"references\":[{\"url\":\"https://github.com/Netatalk/netatalk/issues/486\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/09/msg00031.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://netatalk.io/security/CVE-2023-42464\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://netatalk.sourceforge.io/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Product\"]},{\"url\":\"https://netatalk.sourceforge.io/3.1/htmldocs/afpd.8.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Product\"]},{\"url\":\"https://netatalk.sourceforge.io/CVE-2023-42464.php\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5503\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.