René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

154 lines
5.1 KiB
JSON

{
"id": "CVE-2021-28797",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2021-04-14T09:15:13.910",
"lastModified": "2021-04-21T18:36:29.987",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A stack-based buffer overflow vulnerability has been reported to affect QNAP NAS devices running Surveillance Station. If exploited, this vulnerability allows attackers to execute arbitrary code. QNAP have already fixed this vulnerability in the following versions: Surveillance Station 5.1.5.4.3 (and later) for ARM CPU NAS (64bit OS) and x86 CPU NAS (64bit OS) Surveillance Station 5.1.5.3.3 (and later) for ARM CPU NAS (32bit OS) and x86 CPU NAS (32bit OS)"
},
{
"lang": "es",
"value": "Se ha reportado una vulnerabilidad de desbordamiento del b\u00fafer en la regi\u00f3n stack de la memoria que afecta a los dispositivos QNAP NAS que ejecutan Surveillance Station. Si es explotada, esta vulnerabilidad permite a atacantes ejecutar c\u00f3digo arbitrario. QNAP ya ha corregido esta vulnerabilidad en las siguientes versiones: Surveillance Station versiones 5.1.5.4.3 (y posteriores) para ARM CPU NAS (Sistema Operativo de 64 bits) y x86 CPU NAS (Sistema Operativo de 64 bits) Surveillance Station versiones 5.1.5.3.3 (y posteriores) para ARM CPU NAS (Sistema Operativo de 32 bits) y CPU NAS x86 (Sistema Operativo de 32 bits)"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security@qnapsecurity.com.tw",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "security@qnapsecurity.com.tw",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qnap:surveillance_station:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.1.5.3.3",
"matchCriteriaId": "60DB076A-4279-4E8E-80C2-D1237B99C4A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qnap:surveillance_station:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.1.5.4.0",
"versionEndExcluding": "5.1.5.4.3",
"matchCriteriaId": "E0928C86-06D9-4FFB-AC70-9BB18DB49956"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qnap:nas:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80C76690-809E-4A12-BF56-D713DD49ED27"
}
]
}
]
}
],
"references": [
{
"url": "https://www.qnap.com/en/security-advisory/qsa-21-07",
"source": "security@qnapsecurity.com.tw",
"tags": [
"Vendor Advisory"
]
}
]
}