netatalk is vulnerable to stack based buffer overflow. The vulnerability exists because the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer which allows an attacker to leverage this vulnerability to execute code in the context of root.