Slackware Linux 14.1 / 14.2 / 15.0 / current netatalk Multiple Vulnerabilities (SSA:2023-256-03)

critical Nessus Plugin ID 181395

Synopsis

The remote Slackware Linux host is missing a security update to netatalk.

Description

The version of netatalk installed on the remote host is prior to 3.1.16. It is, therefore, affected by multiple vulnerabilities as referenced in the SSA:2023-256-03 advisory.

- This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parse_entries function. The issue results from the lack of proper error handling when parsing AppleDouble entries. An attacker can leverage this vulnerability to execute code in the context of root.
Was ZDI-CAN-15819. (CVE-2022-23121)

- This vulnerability allows remote attackers to disclose sensitive information on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the getdirparams method. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-15830.
(CVE-2022-23123)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the affected netatalk package.

See Also

http://www.nessus.org/u?1274bf6a

Plugin Details

Severity: Critical

ID: 181395

File Name: Slackware_SSA_2023-256-03.nasl

Version: 1.0

Type: local

Published: 9/14/2023

Updated: 9/14/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2022-23123

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:slackware:slackware_linux:15.0, p-cpe:/a:slackware:slackware_linux:netatalk, cpe:/o:slackware:slackware_linux:14.2, cpe:/o:slackware:slackware_linux, cpe:/o:slackware:slackware_linux:14.1

Required KB Items: Host/local_checks_enabled, Host/Slackware/release, Host/Slackware/packages

Exploit Ease: No known exploits are available

Patch Publication Date: 9/13/2023

Vulnerability Publication Date: 3/28/2023

Reference Information

CVE: CVE-2022-23121, CVE-2022-23123