{ "id": "CVE-2017-13067", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2017-09-14T15:29:00.263", "lastModified": "2019-10-03T00:03:26.223", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "QNAP has patched a remote code execution vulnerability affecting the QTS Media Library in all versions prior to QTS 4.2.6 build 20170905 and QTS 4.3.3.0299 build 20170901. This particular vulnerability allows a remote attacker to execute commands on a QNAP NAS using a transcoding service on port 9251. A remote user does not require any privileges to successfully execute an attack." }, { "lang": "es", "value": "QNAP ha parcheado una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo que afecta a la biblioteca multimedia de QTS en todas sus versiones anteriores a la QTS 4.2.6 build 20170905 y QTS 4.3.3.0299 build 20170901. Esta vulnerabilidad permite que un atacante remoto ejecute comandos en un NAS de QNAP utilizando un servicio de transcodificaci\u00f3n en el puerto 9251. No es necesario que un usuario remoto tenga privilegios para llevar a cabo un ataque con \u00e9xito." } ], "metrics": { "cvssMetricV30": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 7.5 }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.2.0", "versionEndIncluding": "4.2.6", "matchCriteriaId": "F061D299-AF11-413B-96D8-977D8F7BA2A8" }, { "vulnerable": true, "criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.3.0", "versionEndIncluding": "4.3.3.0299", "matchCriteriaId": "B43F1A92-B74F-4F95-8C6C-12552F115922" } ] } ] } ], "references": [ { "url": "https://www.qnap.com/zh-hk/releasenotes/", "source": "security@qnapsecurity.com.tw", "tags": [ "Vendor Advisory" ] } ] }