Description
Netatalk 3.1.2 through 4.4.2 is compiled without FORTIFY_SOURCE, which disables built-in buffer overflow detection at runtime, potentially allowing a remote attacker to cause a minor denial of service via memory errors that would otherwise be caught and safely terminated by runtime protection.
Published: 2026-05-21
Score: 3.7 Low
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Netatalk versions 3.1.2 through 4.4.2 include a build configuration that disables the compile‑time flag FORTIFY_SOURCE, which turns off the runtime buffer overflow detection normally provided by the C standard library. Without this safety net, a malicious remote user can craft input that triggers memory corruption conditions that would ordinarily be intercepted and safely terminated, instead leading to a crash or service reset and thus a minor denial of service. The vulnerability is a weakness in the program’s control over memory operations, as classified by CWE‑693.

Affected Systems

The vendor is Netatalk, and the affected product range is Netatalk 3.1.2 up to and including 4.4.2. No sub‑product or additional vendor details are listed. Any deployment of these versions that exposes the Netatalk service over a network is potentially impacted.

Risk and Exploitability

The CVSS v3.10 score of 3.7 indicates low severity, and no EPSS data is available, so the current public exploitation probability is unknown. The vulnerability is not listed in the CISA KEV catalog, which further suggests that active, publicly known exploits are not in circulation. The likely attack vector is from a remote host that can interact with the Netatalk service; the attacker would need to send specially crafted data to trigger the memory error, causing the service to stop and resulting in a disruption of availability. No privilege escalation or data‑exfiltration capability is described, so the impact is limited to disruption rather than compromise.

Generated by OpenCVE AI on May 21, 2026 at 10:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a Netatalk version in which the FORTIFY_SOURCE flag is enabled or obtain a patch that restores this runtime protection
  • If upgrading is not immediately possible, recompile the affected binaries with the FORTIFY_SOURCE flag enabled to reinstate the buffer overflow checks
  • Continuously monitor system logs and uptime metrics for abnormal restarts or memory errors that may indicate an attempt to trigger the vulnerability

Generated by OpenCVE AI on May 21, 2026 at 10:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 21 May 2026 09:00:00 +0000

Type Values Removed Values Added
Description Netatalk 3.1.2 through 4.4.2 is compiled without FORTIFY_SOURCE, which disables built-in buffer overflow detection at runtime, potentially allowing a remote attacker to cause a minor denial of service via memory errors that would otherwise be caught and safely terminated by runtime protection.
Title FORTIFY_SOURCE disabled
Weaknesses CWE-693
References
Metrics cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: securin

Published:

Updated: 2026-05-21T08:23:40.856Z

Reserved: 2026-05-05T07:25:20.196Z

Link: CVE-2026-44071

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-21T09:16:29.340

Modified: 2026-05-21T09:16:29.340

Link: CVE-2026-44071

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T10:30:08Z

Weaknesses