CVE-2026-44048
Stack Buffer Overflow in Netatalk
Publication date: 2026-05-21
Last updated on: 2026-05-21
Assigner: securin
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| netatalk | netatalk | From 2.0.4 (inc) to 4.4.2 (inc) |
| netatalk | netatalk | 4.4.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stack buffer overflow in Netatalk versions 2.0.4 through 4.4.2. It occurs due to a type confusion involving UCS-2 encoding in the function convert_charset(). This flaw allows an attacker to overwrite parts of the stack, potentially leading to arbitrary code execution or system crashes. The issue was fixed in version 4.4.3.
How can this vulnerability impact me? :
Exploitation of this vulnerability can lead to severe impacts including complete compromise of confidentiality, integrity, and availability of the affected system. An attacker could execute arbitrary code remotely with low complexity and no user interaction required, potentially gaining control over the system or causing denial of service.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed in Netatalk version 4.4.3. Immediate mitigation steps include upgrading Netatalk to version 4.4.3 or later.