Impact
Netatalk versions 2.0.4 through 4.4.2 contain an out‑of‑bounds write in the convert_charset() function caused by improper null termination. The flaw corrupts memory and, when triggered by a crafted character string, can lead to arbitrary code execution or a denial‑of‑service event. It is a classic buffer overrun vulnerability identified as CWE‑787.
Affected Systems
The affected product is Netatalk, produced by the Netatalk project. Any deployed installations of Netatalk from version 2.0.4 up to and including 4.4.2 are vulnerable.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity vulnerability. EPSS information is not available, and the flaw is not listed in the CISA KEV catalog. The described exploitation requires a remote attacker to be authenticated to the Netatalk service, as the vulnerable function is exercised only when authenticated user input is processed. An attacker with valid credentials can send specially crafted character data over the network to trigger convert_charset, resulting in memory corruption that may lead to process crashes or execution of arbitrary code.
OpenCVE Enrichment
Debian DSA