cvelist/2021/38xxx/CVE-2021-38687.json

121 lines
5.1 KiB
JSON
Raw Normal View History

2021-08-13 23:00:49 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "security@qnap.com",
"DATE_PUBLIC": "2021-12-10T00:04:00.000Z",
2021-08-13 23:00:49 +00:00
"ID": "CVE-2021-38687",
"STATE": "PUBLIC",
"TITLE": "Stack Overflow Vulnerability in Surveillance Station"
2021-08-13 23:00:49 +00:00
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Surveillance Station",
"version": {
"version_data": [
{
"platform": "QTS 5.0 (64 bit)",
"version_affected": "<",
"version_value": "5.2.0.4.2 ( 2021/10/26 )"
},
{
"platform": "QTS 5.0 (32 bit)",
"version_affected": "<",
"version_value": "5.2.0.3.2 ( 2021/10/26 )"
},
{
"platform": "QTS 4.3.6 (64 bit)",
"version_affected": "<",
"version_value": "5.1.5.4.6 ( 2021/10/26 )"
},
{
"platform": "QTS 4.3.6 (32 bit)",
"version_affected": "<",
"version_value": "5.1.5.3.6 ( 2021/10/26 )"
},
{
"platform": "QTS 4.3.3",
"version_affected": "<",
"version_value": "5.1.5.3.6 ( 2021/10/26 )"
}
]
}
}
]
},
"vendor_name": "QNAP Systems Inc."
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "crixer"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2021-08-13 23:00:49 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2021-12-29 14:01:13 +00:00
"value": "A stack buffer overflow vulnerability has been reported to affect QNAP NAS running Surveillance Station. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the following versions of Surveillance Station: QTS 5.0.0 (64 bit): Surveillance Station 5.2.0.4.2 ( 2021/10/26 ) and later QTS 5.0.0 (32 bit): Surveillance Station 5.2.0.3.2 ( 2021/10/26 ) and later QTS 4.3.6 (64 bit): Surveillance Station 5.1.5.4.6 ( 2021/10/26 ) and later QTS 4.3.6 (32 bit): Surveillance Station 5.1.5.3.6 ( 2021/10/26 ) and later QTS 4.3.3: Surveillance Station 5.1.5.3.6 ( 2021/10/26 ) and later"
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-120"
}
]
2021-08-13 23:00:49 +00:00
}
]
},
"references": {
"reference_data": [
{
2021-12-29 14:01:13 +00:00
"refsource": "MISC",
"url": "https://www.qnap.com/en/security-advisory/qsa-21-46",
"name": "https://www.qnap.com/en/security-advisory/qsa-21-46"
}
]
},
"solution": [
{
"lang": "eng",
"value": "We have already fixed this vulnerability in the following versions of Surveillance Station:\nQTS 5.0.0 (64 bit): Surveillance Station 5.2.0.4.2 ( 2021/10/26 ) and later\nQTS 5.0.0 (32 bit): Surveillance Station 5.2.0.3.2 ( 2021/10/26 ) and later\nQTS 4.3.6 (64 bit): Surveillance Station 5.1.5.4.6 ( 2021/10/26 ) and later\nQTS 4.3.6 (32 bit): Surveillance Station 5.1.5.3.6 ( 2021/10/26 ) and later\nQTS 4.3.3 (32 bit): Surveillance Station 5.1.5.3.6 ( 2021/10/26 ) and later\n"
}
],
"source": {
"advisory": "QSA-21-46",
"discovery": "EXTERNAL"
2021-08-13 23:00:49 +00:00
}
}