Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2026-44064— ASP session ID out-of-bounds access

CVSS 7.1 · High EPSS 0.01% · P3

Possible ATT&CK Techniques 1AI

T1190 · Exploit Public-Facing Application

Affected Version Matrix 2

VendorProductVersion RangeStatus
NetatalkNetatalk1.3≤ 4.4.2affected
4.4.3unaffected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-44064

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
ASP session ID out-of-bounds access
Source: NVD (National Vulnerability Database)
Vulnerability Description
An out-of-bounds read in ASP session ID handling in Netatalk 1.3 through 4.4.2 allows an adjacent network attacker to obtain limited information or cause a denial of service via a crafted ASP request.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
跨界内存读
Source: NVD (National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
NetatalkNetatalk 1.3 ~ 4.4.2 -

II. Public POCs for CVE-2026-44064

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-44064

登录查看更多情报信息。

Same Patch Batch · Netatalk · 2026-05-21 · 33 CVEs total

CVE-2026-440509.9 CRITICALHeap buffer overflow in CNID daemon comm_rcv()
CVE-2026-440478.8 HIGHSQL injection in MySQL CNID backend
CVE-2026-440488.8 HIGHStack buffer overflow via UCS-2 type confusion in convert_charset()
CVE-2026-440518.1 HIGHArbitrary file read via attacker-controlled symlink creation
CVE-2026-440687.6 HIGHEA path traversal via incomplete sanitization
CVE-2026-440627.5 HIGHMissing o_len bounds check in pull_charset_flags()
CVE-2026-440557.5 HIGHBitwise OR logic bug enables shell injection
CVE-2026-440527.5 HIGHLDAP simple-bind password exposure in log output
CVE-2026-440607.5 HIGHInteger underflow in dsi_writeinit() leads to denial of service
CVE-2026-440497.5 HIGHOut-of-bounds write in convert_charset() null termination
CVE-2026-440537.4 HIGHWeak cryptography in DHCAST128 UAM
CVE-2026-440667.1 HIGHHeap out-of-bounds reads in Spotlight RPC unmarshalling
CVE-2026-440766.7 MEDIUMShell injection via volume path
CVE-2026-440546.5 MEDIUMPredictable afpd session token
CVE-2026-440586.4 MEDIUMAuthentication bypass via admin auth user
CVE-2026-440566.0 MEDIUMStack buffer overflow in desktop.c
CVE-2026-440615.9 MEDIUMDES-ECB auth with timing side channel
CVE-2026-440634.2 MEDIUMLDAP filter injection
CVE-2026-440734.0 MEDIUMseteuid failure ignored in auth modules
CVE-2026-440593.9 LOWNon-reentrant privilege toggle

Showing top 20 of 33 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2026-44064

No comments yet


Leave a comment