CVE-2024-38439

Netatalk before 3.2.1 has an off-by-one error and resultant heap-based buffer overflow because of setting ibuf[PASSWDLEN] to '\0' in FPLoginExt in login in etc/uams/uams_pam.c. 2.4.1 and 3.1.19 are also fixed versions.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
CISA-ADPADP
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 71%
VendorProductVersion
netatalknetatalk
2.0.0 ≤
𝑥
< 2.4.1
netatalknetatalk
3.0.0 ≤
𝑥
< 3.1.19
netatalknetatalk
3.2.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
netatalk
bullseye
vulnerable
bullseye (security)
3.1.12~ds-8+deb11u2
fixed
trixie
4.2.1~ds-1
fixed
sid
4.2.3~ds-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
netatalk
plucky
not-affected
oracular
not-affected
noble
Fixed 3.1.18~ds-1ubuntu0.1~esm1
released
mantic
ignored
jammy
Fixed 3.1.12~ds-9ubuntu0.22.04.4
released
focal
Fixed 3.1.12~ds-4ubuntu0.20.04.4
released
bionic
Fixed 2.2.6-1ubuntu0.18.04.2+esm2
released
xenial
Fixed 2.2.5-1ubuntu0.2+esm2
released
trusty
Fixed 2.2.2-1ubuntu2.2+esm2
released