mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
121 lines
5.1 KiB
JSON
Executable File
121 lines
5.1 KiB
JSON
Executable File
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security@qnap.com",
|
|
"DATE_PUBLIC": "2021-12-10T00:04:00.000Z",
|
|
"ID": "CVE-2021-38687",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "Stack Overflow Vulnerability in Surveillance Station"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Surveillance Station",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"platform": "QTS 5.0 (64 bit)",
|
|
"version_affected": "<",
|
|
"version_value": "5.2.0.4.2 ( 2021/10/26 )"
|
|
},
|
|
{
|
|
"platform": "QTS 5.0 (32 bit)",
|
|
"version_affected": "<",
|
|
"version_value": "5.2.0.3.2 ( 2021/10/26 )"
|
|
},
|
|
{
|
|
"platform": "QTS 4.3.6 (64 bit)",
|
|
"version_affected": "<",
|
|
"version_value": "5.1.5.4.6 ( 2021/10/26 )"
|
|
},
|
|
{
|
|
"platform": "QTS 4.3.6 (32 bit)",
|
|
"version_affected": "<",
|
|
"version_value": "5.1.5.3.6 ( 2021/10/26 )"
|
|
},
|
|
{
|
|
"platform": "QTS 4.3.3",
|
|
"version_affected": "<",
|
|
"version_value": "5.1.5.3.6 ( 2021/10/26 )"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "QNAP Systems Inc."
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"credit": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "crixer"
|
|
}
|
|
],
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A stack buffer overflow vulnerability has been reported to affect QNAP NAS running Surveillance Station. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the following versions of Surveillance Station: QTS 5.0.0 (64 bit): Surveillance Station 5.2.0.4.2 ( 2021/10/26 ) and later QTS 5.0.0 (32 bit): Surveillance Station 5.2.0.3.2 ( 2021/10/26 ) and later QTS 4.3.6 (64 bit): Surveillance Station 5.1.5.4.6 ( 2021/10/26 ) and later QTS 4.3.6 (32 bit): Surveillance Station 5.1.5.3.6 ( 2021/10/26 ) and later QTS 4.3.3: Surveillance Station 5.1.5.3.6 ( 2021/10/26 ) and later"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.0.9"
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 8.1,
|
|
"baseSeverity": "HIGH",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"version": "3.1"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-120"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://www.qnap.com/en/security-advisory/qsa-21-46",
|
|
"name": "https://www.qnap.com/en/security-advisory/qsa-21-46"
|
|
}
|
|
]
|
|
},
|
|
"solution": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "We have already fixed this vulnerability in the following versions of Surveillance Station:\nQTS 5.0.0 (64 bit): Surveillance Station 5.2.0.4.2 ( 2021/10/26 ) and later\nQTS 5.0.0 (32 bit): Surveillance Station 5.2.0.3.2 ( 2021/10/26 ) and later\nQTS 4.3.6 (64 bit): Surveillance Station 5.1.5.4.6 ( 2021/10/26 ) and later\nQTS 4.3.6 (32 bit): Surveillance Station 5.1.5.3.6 ( 2021/10/26 ) and later\nQTS 4.3.3 (32 bit): Surveillance Station 5.1.5.3.6 ( 2021/10/26 ) and later\n"
|
|
}
|
|
],
|
|
"source": {
|
|
"advisory": "QSA-21-46",
|
|
"discovery": "EXTERNAL"
|
|
}
|
|
} |