CVE-2021-31439Heap-based Buffer Overflow in Netatalk

Severity
8.8HIGHNVD
EPSS
1.0%
top 22.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 21
Latest updateJun 8

Description

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology DiskStation Manager. Authentication is not required to exploit this vulnerablity. The specific flaw exists within the processing of DSI structures in Netatalk. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages5 packages

NVDsynology/diskstation_manager6.26.2.3-25426-3
CVEListV5synology/diskstation_manager6.1.1-15101-4
NVDnetatalk/netatalk< 3.1.13
Debiannetatalk/netatalk< 3.1.12~ds-8+deb11u1+2
Ubuntunetatalk/netatalk< 3.1.12~ds-4ubuntu0.20.04.1+4

Also affects: Debian Linux 10.0, 11.0

🔴Vulnerability Details

4
OSV
netatalk vulnerabilities2023-06-08
GHSA
GHSA-8292-4xc6-r7cv: This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology DiskStation Manager2022-05-24
OSV
CVE-2021-31439: This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology DiskStation Manager2021-05-21
CVEList
CVE-2021-31439: This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology DiskStation Manager2021-05-21

📋Vendor Advisories

2
Ubuntu
Netatalk vulnerabilities2023-06-08
Debian
CVE-2021-31439: netatalk - This vulnerability allows network-adjacent attackers to execute arbitrary code o...2021
CVE-2021-31439 — Heap-based Buffer Overflow in Netatalk | cvebase