Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38440: n/a

0
High
VulnerabilityCVE-2024-38440cvecve-2024-38440
Published: Sun Jun 16 2024 (06/16/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Netatalk before 3.2.1 has an off-by-one error, and resultant heap-based buffer overflow and segmentation violation, because of incorrectly using FPLoginExt in BN_bin2bn in etc/uams/uams_dhx_pam.c. The original issue 1097 report stated: 'The latest version of Netatalk (v3.2.0) contains a security vulnerability. This vulnerability arises due to a lack of validation for the length field after parsing user-provided data, leading to an out-of-bounds heap write of one byte (\0). Under specific configurations, this can result in reading metadata of the next heap block, potentially causing a Denial of Service (DoS) under certain heap layouts or with ASAN enabled. ... The vulnerability is located in the FPLoginExt operation of Netatalk, in the BN_bin2bn function found in /etc/uams/uams_dhx_pam.c ... if (!(bn = BN_bin2bn((unsigned char *)ibuf, KEYSIZE, NULL))) ... threads ... [#0] Id 1, Name: "afpd", stopped 0x7ffff4304e58 in ?? (), reason: SIGSEGV ... [#0] 0x7ffff4304e58 mov BYTE PTR [r14+0x8], 0x0 ... mov rdx, QWORD PTR [rsp+0x18] ... afp_login_ext(obj=<optimized out>, ibuf=0x62d000010424 "", ibuflen=0xffffffffffff0015, rbuf=<optimized out>, rbuflen=<optimized out>) ... afp_over_dsi(obj=0x5555556154c0 <obj>).' 2.4.1 and 3.1.19 are also fixed versions.

AI-Powered Analysis

AILast updated: 11/04/2025, 00:04:34 UTC

Technical Analysis

CVE-2024-38440 is a heap-based buffer overflow vulnerability identified in Netatalk, an open-source implementation of the Apple Filing Protocol (AFP) used primarily on Unix-like systems for file sharing. The vulnerability stems from an off-by-one error in the FPLoginExt operation, specifically within the BN_bin2bn function call in the uams_dhx_pam.c source file. The root cause is the lack of proper validation of the length field after parsing user-supplied data, which leads to writing a null byte out-of-bounds on the heap. This single-byte overflow can corrupt adjacent heap metadata, potentially triggering a segmentation fault and causing the AFP daemon (afpd) to crash. The issue affects Netatalk versions prior to 3.2.1, with fixed versions including 2.4.1 and 3.1.19. The vulnerability does not require any privileges or user interaction to exploit, as it can be triggered remotely by sending crafted AFP login extension requests. While the primary impact is denial of service, the heap corruption could theoretically be leveraged for more severe attacks, though no such exploits are currently known. The CVSS v3.1 base score of 7.5 reflects a high severity due to network attack vector, low attack complexity, no privileges required, no user interaction, and impact limited to availability. The vulnerability is tracked under CWE-193 (Off-by-one Error).

Potential Impact

For European organizations, the primary impact of CVE-2024-38440 is the potential disruption of AFP file sharing services due to denial of service caused by the heap overflow and subsequent segmentation fault. Organizations relying on Netatalk for network-attached storage, legacy file sharing, or integration with Apple devices may experience service outages, affecting business continuity and productivity. Critical sectors such as government, finance, education, and healthcare that utilize Unix-based file servers could face operational interruptions. Although no known remote code execution exploits exist yet, the heap corruption could be a stepping stone for more advanced attacks if combined with other vulnerabilities. The vulnerability's network accessibility and lack of authentication requirements increase the risk of exploitation by remote attackers. Given the widespread use of Unix/Linux systems in Europe and the presence of legacy AFP services, the threat is relevant, especially in environments where patching cycles are slow or where Netatalk is embedded in specialized appliances.

Mitigation Recommendations

The most effective mitigation is to upgrade Netatalk to version 3.2.1 or later, or apply patches backported in versions 2.4.1 and 3.1.19. Organizations should audit their environments to identify all Netatalk instances, including embedded systems and NAS devices that may use it. If immediate patching is not feasible, administrators can temporarily disable AFP services or restrict network access to the AFP port (548) using firewalls or network segmentation to limit exposure. Monitoring AFP daemon logs for crashes or unusual activity can help detect exploitation attempts. Additionally, applying heap hardening and memory protection techniques (e.g., ASLR, heap canaries) at the OS level can reduce the risk of successful exploitation. Regular vulnerability scanning and penetration testing targeting AFP services should be incorporated into security programs. Finally, organizations should maintain an inventory of legacy protocols in use and plan migration to more secure file sharing alternatives where possible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-06-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092626fe7723195e0b5acc

Added to database: 11/3/2025, 10:01:10 PM

Last enriched: 11/4/2025, 12:04:34 AM

Last updated: 11/5/2025, 12:57:22 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats