Lucene search

K
openvasCopyright (C) 2022 Greenbone AGOPENVAS:1361412562310148913
HistoryNov 15, 2022 - 12:00 a.m.

Netatalk < 3.1.15 RCE Vulnerability

2022-11-1500:00:00
Copyright (C) 2022 Greenbone AG
plugins.openvas.org
8
netatalk
rce
vulnerability
remote code execution
heap-based buffer overflow
version 3.1.15

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

9

Confidence

High

EPSS

0.001

Percentile

51.2%

Netatalk is prone to a remote code execution (RCE)
vulnerability.

# SPDX-FileCopyrightText: 2022 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:netatalk:netatalk";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.148913");
  script_version("2024-03-15T05:06:15+0000");
  script_tag(name:"last_modification", value:"2024-03-15 05:06:15 +0000 (Fri, 15 Mar 2024)");
  script_tag(name:"creation_date", value:"2022-11-15 08:40:15 +0000 (Tue, 15 Nov 2022)");
  script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2022-11-17 16:16:00 +0000 (Thu, 17 Nov 2022)");

  script_cve_id("CVE-2022-45188");

  script_tag(name:"qod_type", value:"remote_banner_unreliable");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("Netatalk < 3.1.15 RCE Vulnerability");

  script_copyright("Copyright (C) 2022 Greenbone AG");
  script_category(ACT_GATHER_INFO);
  script_family("General");
  script_dependencies("gb_netatalk_asip_afp_detect.nasl");
  script_mandatory_keys("netatalk/detected");

  script_tag(name:"summary", value:"Netatalk is prone to a remote code execution (RCE)
  vulnerability.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"Netatalk has an afp_getappl heap-based buffer overflow resulting
  in code execution via a crafted .appl file. This provides remote root access on some platforms
  such as FreeBSD (used for TrueNAS).");

  script_tag(name:"affected", value:"Netatalk prior to version 3.1.15.");

  script_tag(name:"solution", value:"Update to version 3.1.15 or later.");

  script_xref(name:"URL", value:"https://netatalk.io/3.1/ReleaseNotes3.1.15");
  script_xref(name:"URL", value:"https://rushbnt.github.io/bug%20analysis/netatalk-0day/");
  script_xref(name:"URL", value:"https://github.com/Netatalk/Netatalk/releases/tag/netatalk-3-1-15");
  script_xref(name:"URL", value:"https://github.com/Netatalk/netatalk/issues/240");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if (!port = get_app_port(cpe: CPE))
  exit(0);

if (!version = get_app_version(cpe: CPE, port: port))
  exit(0);

if (version_is_less(version: version, test_version: "3.1.15")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "3.1.15");
  security_message(port: port, data: report);
  exit(0);
}

exit(99);

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

9

Confidence

High

EPSS

0.001

Percentile

51.2%