A stack buffer overflow vulnerability has been reported to affect QNAP NAS running Surveillance Station. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the following versions of Surveillance Station: QTS 5.0.0 (64 bit): Surveillance Station 5.2.0.4.2 ( 2021/10/26 ) and later QTS 5.0.0 (32 bit): Surveillance Station 5.2.0.3.2 ( 2021/10/26 ) and later QTS 4.3.6 (64 bit): Surveillance Station 5.1.5.4.6 ( 2021/10/26 ) and later QTS 4.3.6 (32 bit): Surveillance Station 5.1.5.3.6 ( 2021/10/26 ) and later QTS 4.3.3: Surveillance Station 5.1.5.3.6 ( 2021/10/26 ) and later
References
Link | Resource |
---|---|
https://www.qnap.com/en/security-advisory/qsa-21-46 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
10 Jan 2022, 20:54
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
CPE | cpe:2.3:o:qnap:qts:4.3.3:*:*:*:*:*:*:* cpe:2.3:o:qnap:qts:4.3.6:*:*:*:*:*:x64:* cpe:2.3:o:qnap:qts:5.0.0:*:*:*:*:*:x86:* cpe:2.3:o:qnap:qts:4.3.6:*:*:*:*:*:x86:* cpe:2.3:o:qnap:qts:5.0.0:*:*:*:*:*:x64:* cpe:2.3:a:qnap:surveillance_station:*:*:*:*:*:*:*:* |
|
References | (CONFIRM) https://www.qnap.com/en/security-advisory/qsa-21-46 - Vendor Advisory |
29 Dec 2021, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-12-29 13:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-38687
Mitre link : CVE-2021-38687
CVE.ORG link : CVE-2021-38687
JSON object : View
Products Affected
qnap
- qts
- surveillance_station
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')