Impact
A stack-based buffer overflow exists in the desktop.c file of Netatalk versions 1.3 through 4.2.2. A remote attacker who has authenticated to the AFP server can trigger the overflow, potentially leading to denial of service, limited information disclosure, or limited data modification. The weakness is classified as CWE‑121.
Affected Systems
Affected versions are Netatalk 1.3 through 4.2.2. No information about a fixed release is present in the official data.
Risk and Exploitability
The CVSS score of 6 indicates moderate risk. The EPSS score is not available, so exploitation likelihood remains unclear. The vulnerability is not listed in CISA KEV. The attack requires an authenticated session with the AFP server; an attacker must have valid credentials and then send a specially crafted request to trigger the overflow. No official patch or workaround is listed, so monitoring and preventive hardening are recommended.
OpenCVE Enrichment