CVE-2024-38440

Publication date 16 June 2024

Last updated 30 May 2025


Ubuntu priority

Cvss 3 Severity Score

7.5 · High

Score breakdown

Netatalk 3.2.0 has an off-by-one error, and resultant heap-based buffer overflow and segmentation violation, because of incorrectly using FPLoginExt in BN_bin2bn in etc/uams/uams_dhx_pam.c. The original issue 1097 report stated: 'The latest version of Netatalk (v3.2.0) contains a security vulnerability. This vulnerability arises due to a lack of validation for the length field after parsing user-provided data, leading to an out-of-bounds heap write of one byte (\0). Under specific configurations, this can result in reading metadata of the next heap block, potentially causing a Denial of Service (DoS) under certain heap layouts or with ASAN enabled. ... The vulnerability is located in the FPLoginExt operation of Netatalk, in the BN_bin2bn function found in /etc/uams/uams_dhx_pam.c ... if (!(bn = BN_bin2bn((unsigned char *)ibuf, KEYSIZE, NULL))) ... threads ... [#0] Id 1, Name: "afpd", stopped 0x7ffff4304e58 in ?? (), reason: SIGSEGV ... [#0] 0x7ffff4304e58 mov BYTE PTR [r14+0x8], 0x0 ... mov rdx, QWORD PTR [rsp+0x18] ... afp_login_ext(obj=<optimized out>, ibuf=0x62d000010424 "", ibuflen=0xffffffffffff0015, rbuf=<optimized out>, rbuflen=<optimized out>) ... afp_over_dsi(obj=0x5555556154c0 <obj>).'

Status

Package Ubuntu Release Status
netatalk 25.04 plucky
Not affected
24.10 oracular
Not affected
24.04 LTS noble
Fixed 3.1.18~ds-1ubuntu0.1~esm1
23.10 mantic Ignored end of life, was needs-triage
22.04 LTS jammy
Fixed 3.1.12~ds-9ubuntu0.22.04.4
20.04 LTS focal
Fixed 3.1.12~ds-4ubuntu0.20.04.4
18.04 LTS bionic
Fixed 2.2.6-1ubuntu0.18.04.2+esm2
16.04 LTS xenial
Fixed 2.2.5-1ubuntu0.2+esm2
14.04 LTS trusty
Fixed 2.2.2-1ubuntu2.2+esm2

Get expanded security coverage with Ubuntu Pro

Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.

Get Ubuntu Pro

Severity score breakdown

Parameter Value
Base score 7.5 · High
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References

Related Ubuntu Security Notices (USN)

    • USN-7347-1
    • Netatalk vulnerabilities
    • 12 March 2025

Other references