CVE-2018-1160

9.8 CRITICAL
Published: December 20, 2018 Modified: February 13, 2026
View on NVD

Description

Netatalk before 3.1.12 is vulnerable to an out of bounds write in dsi_opensess.c. This is due to lack of bounds checking on attacker controlled data. A remote unauthenticated attacker can leverage this vulnerability to achieve arbitrary code execution.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://netatalk.sourceforge.net/3.1/ReleaseNotes3.1.12.html
Source: vulnreport@tenable.com
Release Notes
http://packetstormsecurity.com/files/152440/QNAP-Netatalk-Authentication-Bypass.html
Source: vulnreport@tenable.com
Exploit Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/106301
Source: vulnreport@tenable.com
Third Party Advisory VDB Entry
https://attachments.samba.org/attachment.cgi?id=14735
Source: vulnreport@tenable.com
Third Party Advisory
https://github.com/tenable/poc/tree/master/netatalk/cve_2018_1160/
Source: vulnreport@tenable.com
Release Notes Third Party Advisory
https://www.debian.org/security/2018/dsa-4356
Source: vulnreport@tenable.com
Third Party Advisory
https://www.exploit-db.com/exploits/46034/
Source: vulnreport@tenable.com
Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/46048/
Source: vulnreport@tenable.com
Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/46675/
Source: vulnreport@tenable.com
Exploit Third Party Advisory VDB Entry
https://www.synology.com/security/advisory/Synology_SA_18_62
Source: vulnreport@tenable.com
Third Party Advisory
https://www.tenable.com/security/research/tra-2018-48
Source: vulnreport@tenable.com
Exploit Release Notes Third Party Advisory
http://netatalk.sourceforge.net/3.1/ReleaseNotes3.1.12.html
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes
http://packetstormsecurity.com/files/152440/QNAP-Netatalk-Authentication-Bypass.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/106301
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://attachments.samba.org/attachment.cgi?id=14735
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://github.com/tenable/poc/tree/master/netatalk/cve_2018_1160/
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes Third Party Advisory
https://www.debian.org/security/2018/dsa-4356
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.exploit-db.com/exploits/46034/
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/46048/
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/46675/
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory VDB Entry
https://www.synology.com/security/advisory/Synology_SA_18_62
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.tenable.com/security/research/tra-2018-48
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Release Notes Third Party Advisory

22 reference(s) from NVD

Quick Stats

CVSS v3 Score
9.8 / 10.0
EPSS (Exploit Probability)
89.7%
100th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

synology netatalk debian