Executive Summary

Informations
Name CVE-2023-42464 First vendor Publication 2023-09-20
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 9.8
Base Score 9.8 Environmental Score 9.8
impact SubScore 5.9 Temporal Score 9.8
Exploitabality Sub Score 3.9
 
Attack Vector Network Attack Complexity Low
Privileges Required None User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

A Type Confusion vulnerability was found in the Spotlight RPC functions in afpd in Netatalk 3.1.x before 3.1.17. When parsing Spotlight RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the underlying protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a malicious actor may be able to fully control the value of the pointer and theoretically achieve Remote Code Execution on the host. This issue is similar to CVE-2023-34967.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42464

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 33
Os 2

Sources (Detail)

https://github.com/Netatalk/netatalk/issues/486
https://lists.debian.org/debian-lts-announce/2023/09/msg00031.html
https://netatalk.io/security/CVE-2023-42464
https://netatalk.sourceforge.io/
https://netatalk.sourceforge.io/3.1/htmldocs/afpd.8.html
https://netatalk.sourceforge.io/CVE-2023-42464.php
https://www.debian.org/security/2023/dsa-5503
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
Date Informations
2024-11-28 14:29:15
  • Multiple Updates
2024-07-01 13:27:49
  • Multiple Updates
2024-01-13 00:27:53
  • Multiple Updates
2023-10-06 09:27:33
  • Multiple Updates
2023-09-29 21:27:36
  • Multiple Updates
2023-09-26 05:27:22
  • Multiple Updates
2023-09-23 00:27:20
  • Multiple Updates
2023-09-21 13:27:19
  • Multiple Updates
2023-09-20 21:27:20
  • First insertion