Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2026-44073— seteuid failure ignored in auth modules

CVSS 4.0 · Medium EPSS 0.11% · P29

Affected Version Matrix 2

VendorProductVersion RangeStatus
NetatalkNetatalk1.5.0≤ 4.4.2affected
4.5.0unaffected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-44073

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
seteuid failure ignored in auth modules
Source: NVD (National Vulnerability Database)
Vulnerability Description
Authentication modules in Netatalk 1.5.0 through 4.4.2 fail to check the return value of seteuid(), which may allow a remote authenticated attacker to retain elevated privileges under error conditions.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
对于放弃特权的检查不恰当
Source: NVD (National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
NetatalkNetatalk 1.5.0 ~ 4.4.2 -

II. Public POCs for CVE-2026-44073

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-44073

登录查看更多情报信息。

Same Patch Batch · Netatalk · 2026-05-21 · 33 CVEs total

CVE-2026-440509.9 CRITICALHeap buffer overflow in CNID daemon comm_rcv()
CVE-2026-440478.8 HIGHSQL injection in MySQL CNID backend
CVE-2026-440488.8 HIGHStack buffer overflow via UCS-2 type confusion in convert_charset()
CVE-2026-440518.1 HIGHArbitrary file read via attacker-controlled symlink creation
CVE-2026-440687.6 HIGHEA path traversal via incomplete sanitization
CVE-2026-440627.5 HIGHMissing o_len bounds check in pull_charset_flags()
CVE-2026-440557.5 HIGHBitwise OR logic bug enables shell injection
CVE-2026-440527.5 HIGHLDAP simple-bind password exposure in log output
CVE-2026-440607.5 HIGHInteger underflow in dsi_writeinit() leads to denial of service
CVE-2026-440497.5 HIGHOut-of-bounds write in convert_charset() null termination
CVE-2026-440537.4 HIGHWeak cryptography in DHCAST128 UAM
CVE-2026-440647.1 HIGHASP session ID out-of-bounds access
CVE-2026-440667.1 HIGHHeap out-of-bounds reads in Spotlight RPC unmarshalling
CVE-2026-440766.7 MEDIUMShell injection via volume path
CVE-2026-440546.5 MEDIUMPredictable afpd session token
CVE-2026-440586.4 MEDIUMAuthentication bypass via admin auth user
CVE-2026-440566.0 MEDIUMStack buffer overflow in desktop.c
CVE-2026-440615.9 MEDIUMDES-ECB auth with timing side channel
CVE-2026-440634.2 MEDIUMLDAP filter injection
CVE-2026-440593.9 LOWNon-reentrant privilege toggle

Showing top 20 of 33 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2026-44073

No comments yet


Leave a comment