CVE-2018-1160
Critical
|9.8Exploit Available
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to run any code they want on a system using Netatalk, which could lead to complete control over that system. It can be exploited remotely without needing to log in, as long as the attacker can send specially crafted data to the affected software.
Technical Description
Netatalk before 3.1.12 is vulnerable to an out of bounds write in dsi_opensess.c. This is due to lack of bounds checking on attacker controlled data. A remote unauthenticated attacker can leverage this vulnerability to achieve arbitrary code execution.
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged
Vector String
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$13,000($5K-$15K)
Vendor Response
Grade FPatched in 2611 days
Quick Information
Published
Dec 20, 2018
about 7 years ago
Last Modified
Feb 13, 2026
7 days ago
Vendor
netatalk
Product
netatalk