git: c999b147633b - main - security/vuxml: add net/netatalk3 vulnerabilities
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Sun, 30 Jun 2024 17:50:38 UTC
The branch main has been updated by fernape:
URL: https://cgit.FreeBSD.org/ports/commit/?id=c999b147633b20e0f23315598c5c4e1d4452c201
commit c999b147633b20e0f23315598c5c4e1d4452c201
Author: Fernando Apesteguía <fernape@FreeBSD.org>
AuthorDate: 2024-06-30 17:42:51 +0000
Commit: Fernando Apesteguía <fernape@FreeBSD.org>
CommitDate: 2024-06-30 17:42:51 +0000
security/vuxml: add net/netatalk3 vulnerabilities
* CVE-2024-38439
* CVE-2024-38440
* CVE-2024-38441
NVD assessments not yet provided.
PR: 280046
Reported by: Dutchman01 <dutchman01@quicknet.nl>
---
security/vuxml/vuln/2024.xml | 52 ++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 52 insertions(+)
diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml
index fc912f66ad6d..7c50552a00d0 100644
--- a/security/vuxml/vuln/2024.xml
+++ b/security/vuxml/vuln/2024.xml
@@ -1,3 +1,55 @@
+ <vuln vid="c742dbe8-3704-11ef-9e6e-b42e991fc52e">
+ <topic>netatalk3 -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>netatalk3</name>
+ <range><lt>3.2.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>cve@mitre.org reports:</p>
+ <blockquote cite="https://github.com/Netatalk/netatalk/blob/90d91a9ac9a7d6132ab7620d31c8c23400949206/etc/afpd/directory.c#L2333">
+ <p>This entry documents the following three vulnerabilities:</p>
+ <ul>
+ <li>Netatalk before 3.2.1 has an off-by-one error and resultant heap-based
+ buffer overflow because of setting ibuf[len] to '\0' in
+ FPMapName in afp_mapname in etc/afpd/directory.c. 2.4.1 and 3.1.19
+ are also fixed versions.</li>
+ <li>Netatalk before 3.2.1 has an off-by-one error, and resultant
+ heap-based buffer overflow and segmentation violation, because of
+ incorrectly using FPLoginExt in BN_bin2bn in etc/uams/uams_dhx_pam.c.
+ The original issue 1097 report stated: 'The latest version of
+ Netatalk (v3.2.0) contains a security vulnerability. This vulnerability
+ arises due to a lack of validation for the length field after parsing
+ user-provided data, leading to an out-of-bounds heap write of one
+ byte (\0). Under specific configurations, this can result in reading
+ metadata of the next heap block, potentially causing a Denial of
+ Service (DoS) under certain heap layouts or with ASAN enabled. ...
+ </li>
+ <li>Netatalk before 3.2.1 has an off-by-one error and resultant heap-based
+ buffer overflow because of setting ibuf[PASSWDLEN] to '\0'
+ in FPLoginExt in login in etc/uams/uams_pam.c. 2.4.1 and 3.1.19
+ are also fixed versions.
+ </li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2024-38440</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2024-38440</url>
+ <cvename>CVE-2024-38441</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2024-38441</url>
+ <cvename>CVE-2024-38439</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2024-38439</url>
+ </references>
+ <dates>
+ <discovery>2024-06-16</discovery>
+ <entry>2024-06-30</entry>
+ </dates>
+ </vuln>
+
<vuln vid="0e73964d-053a-481a-bf1c-202948d68484">
<topic>electron29 -- multiple vulnerabilities</topic>
<affects>