CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-38439

Medium Severity
Netatalk
SVRS
34/100

CVSSv3
9.8/10

EPSS
0.00728/1

CVE-2024-38439 is a critical heap-based buffer overflow vulnerability in Netatalk before version 3.2.1, stemming from an off-by-one error in the FPLoginExt function. This flaw, located within the login process in etc/uams/uams_pam.c, arises from incorrectly setting ibuf[PASSWDLEN] to '\0'. Although the CVSS score is a very high 9.8, SOCRadar's Vulnerability Risk Score (SVRS) is 34 indicating it may not be as actively exploited compared to other vulnerabilities with higher SVRS scores. Versions 2.4.1 and 3.1.19 are also patched versions. Successful exploitation could lead to remote code execution on affected systems. Despite being tagged as "In The Wild", the relatively low SVRS suggests the exploit may not be widespread. However, given the potential for significant impact, organizations using Netatalk should prioritize updating to a patched version to mitigate the security risk associated with this vulnerability.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:N
UI:N
S:U
C:H
I:H
A:H
2024-06-16

2024-08-22

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

USN-7347-1: Netatalk vulnerabilities
2025-03-12
USN-7347-1: Netatalk vulnerabilities | It was discovered that Netatalk did not properly manage memory under certain circumstances. A remote attacker could possibly use this issue to execute arbitrary code. (CVE-2024-38439, CVE-2024-38440, CVE-2024-38441)
ubuntu.com
rss
forum
news
CVE-2024-38439 | Netatalk 3.2.0 Setting etc/uams/uams_pam.c FPLoginExt ibuf[PASSWDLEN] heap-based overflow (Nessus ID 211927)
vuldb.com2024-11-28
CVE-2024-38439 | Netatalk 3.2.0 Setting etc/uams/uams_pam.c FPLoginExt ibuf[PASSWDLEN] heap-based overflow (Nessus ID 211927) | A vulnerability classified as critical has been found in Netatalk 3.2.0. This affects the function FPLoginExt of the file etc/uams/uams_pam.c of the component Setting Handler. The manipulation of the argument ibuf[PASSWDLEN] leads to heap-based buffer overflow. This vulnerability
vuldb.com
rss
forum
news
CVE-2024-38439 | Netatalk 3.2.0 Setting etc/uams/uams_pam.c FPLoginExt ibuf[PASSWDLEN] heap-based overflow
vuldb.com2024-06-16
CVE-2024-38439 | Netatalk 3.2.0 Setting etc/uams/uams_pam.c FPLoginExt ibuf[PASSWDLEN] heap-based overflow | A vulnerability classified as critical has been found in Netatalk 3.2.0. This affects the function FPLoginExt of the file etc/uams/uams_pam.c of the component Setting Handler. The manipulation of the argument ibuf[PASSWDLEN] leads to heap-based buffer overflow. This vulnerability is uniquely identified
cve-2024-38439
domains
urls
cves

Social Media

CVE-2024-38439 Netatalk 3.2.0 has an off-by-one error and resultant heap-based buffer overflow because of setting ibuf[PASSWDLEN] to '\0' in FPLoginExt in login in etc/uams/uams_pam… https://t.co/vgpzTawh3A
0
0
0

Affected Software

Configuration 1
TypeVendorProduct
AppNetatalknetatalk

References

ReferenceLink
CVE@MITRE.ORGhttps://github.com/Netatalk/netatalk/issues/1096
CVE@MITRE.ORGhttps://github.com/Netatalk/netatalk/blob/90d91a9ac9a7d6132ab7620d31c8c23400949206/etc/uams/uams_pam.c#L316
CVE@MITRE.ORGhttps://github.com/Netatalk/netatalk/issues/1096
CVE@MITRE.ORGhttps://github.com/Netatalk/netatalk/blob/90d91a9ac9a7d6132ab7620d31c8c23400949206/etc/uams/uams_pam.c#L316
CVE@MITRE.ORGhttps://github.com/Netatalk/netatalk/issues/1096
CVE@MITRE.ORGhttps://github.com/Netatalk/netatalk/security/advisories/GHSA-8r68-857c-4rqc
CVE@MITRE.ORGhttps://netatalk.io/security/CVE-2024-38439

CWE Details

CWE IDCWE NameDescription
CWE-787Out-of-bounds WriteThe software writes data past the end, or before the beginning, of the intended buffer.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence