cve/2023/CVE-2023-50361.md

21 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-28 08:49:17 +00:00
### [CVE-2023-50361](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50361)
![](https://img.shields.io/static/v1?label=Product&message=QTS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=QuTS%20hero&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=5.1.x%3C%205.1.6.2722%20build%2020240402%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=h5.1.x%3C%20h5.1.6.2734%20build%2020240414%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-120&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-121&color=brighgreen)
### Description
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to execute code via a network.We have already fixed the vulnerability in the following versions:QTS 5.1.6.2722 build 20240402 and laterQuTS hero h5.1.6.2734 build 20240414 and later
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds