Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2022-22995 #480

Closed
knight-of-ni opened this issue Sep 12, 2023 · 5 comments
Closed

CVE-2022-22995 #480

knight-of-ni opened this issue Sep 12, 2023 · 5 comments
Assignees

Comments

@knight-of-ni
Copy link
Contributor

Since this has gone unfixed, I am kindly placing this here for visibility:
https://nvd.nist.gov/vuln/detail/cve-2022-22995

It is unclear to me exactly what the issue is. Is it the default afp.conf that ships with nearly all parameters commented out?

As the fedora packager for netatalk, I could continue to just ignore this, but thought I'd mention something in case the current upstream maintainers are not aware.

https://bugzilla.redhat.com/show_bug.cgi?id=2069300

@rdmark
Copy link
Member

rdmark commented Sep 12, 2023

There's a severe lack of context in the body of the CVE record to make judgment one way or the other. Interesting that they call out Samba and Netatalk in the same sentence. The two have very different default config files. (Although they have code elsewhere that share original authorship.)

For the record this is all there is in the CVE record, unless I'm overlooking something:

The combination of primitives offered by SMB and AFP in their default configuration allows the arbitrary writing of files. By exploiting these combination of primitives, an attacker can execute arbitrary code.

Reported By: Corentin BAYET (@OnlyTheDuck), Etienne HELLUY-LAFONT and Luca MORO (@johncool__) from Synacktiv working with Trend Micro’s Zero Day Initiative

Let me try to reach out to the authors to hear if they have further information that's not in the public CVE record.

@rdmark
Copy link
Member

rdmark commented Sep 12, 2023

I contacted Corentin over LinkedIn now (same name, same company.) The other two I couldn't immediately find.

If someone here has an X (Twitter) account, might you contact Luca via the given handle?

@rdmark
Copy link
Member

rdmark commented Sep 12, 2023

Corentin responded to me and said he can provide additional information about the exploit shortly.

@knight-of-ni
Copy link
Contributor Author

Yeah, the content of this CVE was very ambiguous. I could only guess what was meant, and even if I did patch the default afp.conf during the packaging process, how could I be sure it really fixed what the CVE author was getting at?

Anyways, thanks for finding someone who might be a good source of information for this one. Maybe we can put this to rest soon.

@rdmark rdmark self-assigned this Oct 5, 2023
@rdmark
Copy link
Member

rdmark commented Oct 5, 2023

Patch in #509

@rdmark rdmark closed this as completed Oct 5, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
No open projects
Status: Done
Development

No branches or pull requests

2 participants