Description
Multiple heap out-of-bounds reads in the Spotlight RPC unmarshalling code in Netatalk 3.1.0 through 4.4.2 allow a remote authenticated attacker to obtain sensitive information or cause a minor service disruption.
Published: 2026-05-21
Score: 7.1 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a heap out-of-bounds read that occurs during Spotlight RPC unmarshalling. This flaw allows bytes beyond the intended buffer to be read, enabling a remote authenticated attacker to obtain sensitive information or cause a minor service disruption. The weakness is an out-of-bounds read, classified as CWE-125.

Affected Systems

Netatalk, versions 3.1.0 through 4.4.2, are affected. The vulnerability is present in the Netatalk server component that handles Spotlight RPC requests.

Risk and Exploitability

The CVSS score of 7.1 indicates a high impact with potential confidentiality compromise. EPSS data is not available, so the current likelihood of exploitation remains unknown. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that an attacker could send crafted Spotlight RPC messages over the network to trigger the out-of-bounds read, leading to data leakage.

Generated by OpenCVE AI on May 21, 2026 at 10:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Netatalk to version 4.4.3 or later.
  • If an immediate upgrade is not possible, disable the Spotlight RPC service or block inbound RPC traffic to prevent exploitation.
  • Review network traffic for anomalous RPC requests and consider implementing network segmentation to limit the attack surface.

Generated by OpenCVE AI on May 21, 2026 at 10:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-62801 netatalk security update
History

Thu, 21 May 2026 09:00:00 +0000

Type Values Removed Values Added
Description In Netatalk 3.1.0 through 4.4.2, heap out-of-bounds reads in spotlight rpc unmarshalling. Fixed in 4.4.3. Multiple heap out-of-bounds reads in the Spotlight RPC unmarshalling code in Netatalk 3.1.0 through 4.4.2 allow a remote authenticated attacker to obtain sensitive information or cause a minor service disruption.

Thu, 21 May 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Netatalk
Netatalk netatalk
Vendors & Products Netatalk
Netatalk netatalk

Thu, 21 May 2026 07:45:00 +0000

Type Values Removed Values Added
Description In Netatalk 3.1.0 through 4.4.2, heap out-of-bounds reads in spotlight rpc unmarshalling. Fixed in 4.4.3.
Title Heap out-of-bounds reads in Spotlight RPC unmarshalling
Weaknesses CWE-125
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L'}


Subscriptions

Netatalk Netatalk
cve-icon MITRE

Status: PUBLISHED

Assigner: securin

Published:

Updated: 2026-05-21T07:52:42.816Z

Reserved: 2026-05-05T07:25:12.313Z

Link: CVE-2026-44066

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-21T08:16:22.253

Modified: 2026-05-21T09:16:28.847

Link: CVE-2026-44066

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T10:45:08Z

Weaknesses