Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

[R2] Netatalk Out-of-bounds Write

Critical

Synopsis

Tenable discovered an out-of-bounds write in Netatalk's dsi_opensession() function in dsi_opensess.c. The vulnerable code follows:

memcpy(&dsi->attn_quantum, dsi->commands + i + 1, dsi->commands[i]);

The attn_quantum variable is a 32 bit integer and dsi->commands is attacker controlled. A remote unauthenticated attacker can leverage this to write 251 bytes beyond the attn_quantum in the dsi struct and control code execution.

Solution

Upgrade to Netatalk 3.1.12.

Disclosure Timeline

10/27/2018 - Tenable contacts a project admin asking for the best place to disclose.
10/28/2018 - Project admin replies that they are a reasonable choice.
10/28/2018 - Tenable discloses via encrypted email. 90 day: Jan 28.
10/29/2018 - Netatalk thanks Tenable and indicates a fix should be ready before the 90 days. Asks Tenable for a public key.
10/29/2018 - Tenable sends a public key and assigns CVE-2018-1160.
11/11/2018 - Netatalk shares a patch.
11/11/2018 - Tenable acknowledges the email.
11/27/2018 - Tenable asks for an update.
11/27/2018 - Netatalk still reviewing the patch. Asks Tenable for feedback.
11/28/2018 - Tenable somehow overlooked Netatalk had shared the patch. Tenable thinks the patch looks good.
11/28/2018 - Netatalk acknowledges Tenable's response.
12/11/2018 - Tenable reminds Netatalk that 45 days remain in the disclosure timeline.
12/13/2018 - Netatalk proposes 12/20 disclosure. Shares a copy of an advisory and discusses plans for disseminating the disclosure.
12/13/2018 - Tenable acknowledges the disclosure date. Further discusses disclosure related information.
12/13/2018 - Netatalk further explains open source vulnerability disclosure.
12/19/2018 - Tenable checks in with Netatalk to see if 12/20 is still on track.
12/19/2018 - Netatalk confirms and suggests a 4pm CET release time.
12/19/2018 - Tenable agrees that works.
12/19/2018 - Netatalk shares a second version of the advisory.
12/20/2018 - Tenable tries to notify vendors they believe are affected.

All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]

Risk Information

CVE ID: CVE-2018-1160
Tenable Advisory ID: TRA-2018-48
Credit:
Jacob Baines
CVSSv2 Base / Temporal Score:
10.0 / 7.8
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
Nessus Plugin ID: 119780
119946
119870
119853
119817
Affected Products:
Netatalk 3.1.11 and below
Risk Factor:
Critical

Advisory Timeline

12/20/2018 - [R1] Initial Release
12/22/2018 - [R2] Added a vendor advisory