Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-31439 (GCVE-0-2021-31439)
Vulnerability from cvelistv5
- CWE-122 - Heap-based Buffer Overflow
Vendor | Product | Version | ||
---|---|---|---|---|
Synology | DiskStation Manager |
Version: 6.1.1-15101-4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:55:53.784Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-492/" }, { "tags": [ "x_transferred" ], "url": "https://www.synology.com/zh-hk/security/advisory/Synology_SA_20_26" }, { "name": "[debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00018.html" }, { "name": "DSA-5503", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5503" }, { "name": "GLSA-202311-02", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202311-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "DiskStation Manager", "vendor": "Synology", "versions": [ { "status": "affected", "version": "6.1.1-15101-4" } ] } ], "credits": [ { "lang": "en", "value": "Angelboy(@scwuaptx) from DEVCORE Security Team" } ], "descriptions": [ { "lang": "en", "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology DiskStation Manager. Authentication is not required to exploit this vulnerablity. The specific flaw exists within the processing of DSI structures in Netatalk. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12326." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-01T16:06:27.666921", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-492/" }, { "url": "https://www.synology.com/zh-hk/security/advisory/Synology_SA_20_26" }, { "name": "[debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00018.html" }, { "name": "DSA-5503", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5503" }, { "name": "GLSA-202311-02", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202311-02" } ] } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2021-31439", "datePublished": "2021-05-21T00:00:00", "dateReserved": "2021-04-16T00:00:00", "dateUpdated": "2024-08-03T22:55:53.784Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-31439\",\"sourceIdentifier\":\"zdi-disclosures@trendmicro.com\",\"published\":\"2021-05-21T15:15:07.707\",\"lastModified\":\"2025-01-14T19:29:55.853\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology DiskStation Manager. Authentication is not required to exploit this vulnerablity. The specific flaw exists within the processing of DSI structures in Netatalk. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12326.\"},{\"lang\":\"es\",\"value\":\"Esta vulnerabilidad permite a atacantes adyacentes a la red ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de Synology DiskStation Manager.\u0026#xa0;No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad.\u0026#xa0;El fallo espec\u00edfico existe dentro del procesamiento de estructuras DSI en Netatalk.\u0026#xa0;El problema es debido a una falta de validaci\u00f3n apropiada de la longitud de los datos suministrados por el usuario antes de copiarlos en un b\u00fafer en la regi\u00f3n heap de la memoria.\u0026#xa0;Un atacante puede explotar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual.\u0026#xa0;Fue ZDI-CAN-12326\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"zdi-disclosures@trendmicro.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":5.8,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":6.5,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"zdi-disclosures@trendmicro.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-122\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:synology:diskstation_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.2.3-25426-3\",\"matchCriteriaId\":\"802D9C58-689C-496A-A9F2-A6A4879186B1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netatalk:netatalk:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.1.13\",\"matchCriteriaId\":\"24D5049D-2145-4D39-BFAC-6D810026956D\"}]}]}],\"references\":[{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/05/msg00018.html\",\"source\":\"zdi-disclosures@trendmicro.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202311-02\",\"source\":\"zdi-disclosures@trendmicro.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5503\",\"source\":\"zdi-disclosures@trendmicro.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.synology.com/zh-hk/security/advisory/Synology_SA_20_26\",\"source\":\"zdi-disclosures@trendmicro.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.zerodayinitiative.com/advisories/ZDI-21-492/\",\"source\":\"zdi-disclosures@trendmicro.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/05/msg00018.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202311-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5503\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.synology.com/zh-hk/security/advisory/Synology_SA_20_26\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.zerodayinitiative.com/advisories/ZDI-21-492/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]}]}}" } }
fkie_cve-2021-31439
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
synology | diskstation_manager | * | |
debian | debian_linux | 10.0 | |
debian | debian_linux | 11.0 | |
netatalk | netatalk | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:synology:diskstation_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "802D9C58-689C-496A-A9F2-A6A4879186B1", "versionEndExcluding": "6.2.3-25426-3", "versionStartIncluding": "6.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netatalk:netatalk:*:*:*:*:*:*:*:*", "matchCriteriaId": "24D5049D-2145-4D39-BFAC-6D810026956D", "versionEndExcluding": "3.1.13", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology DiskStation Manager. Authentication is not required to exploit this vulnerablity. The specific flaw exists within the processing of DSI structures in Netatalk. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12326." }, { "lang": "es", "value": "Esta vulnerabilidad permite a atacantes adyacentes a la red ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de Synology DiskStation Manager.\u0026#xa0;No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad.\u0026#xa0;El fallo espec\u00edfico existe dentro del procesamiento de estructuras DSI en Netatalk.\u0026#xa0;El problema es debido a una falta de validaci\u00f3n apropiada de la longitud de los datos suministrados por el usuario antes de copiarlos en un b\u00fafer en la regi\u00f3n heap de la memoria.\u0026#xa0;Un atacante puede explotar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual.\u0026#xa0;Fue ZDI-CAN-12326" } ], "id": "CVE-2021-31439", "lastModified": "2025-01-14T19:29:55.853", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "zdi-disclosures@trendmicro.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-05-21T15:15:07.707", "references": [ { "source": "zdi-disclosures@trendmicro.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00018.html" }, { "source": "zdi-disclosures@trendmicro.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202311-02" }, { "source": "zdi-disclosures@trendmicro.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2023/dsa-5503" }, { "source": "zdi-disclosures@trendmicro.com", "tags": [ "Vendor Advisory" ], "url": "https://www.synology.com/zh-hk/security/advisory/Synology_SA_20_26" }, { "source": "zdi-disclosures@trendmicro.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-492/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202311-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2023/dsa-5503" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.synology.com/zh-hk/security/advisory/Synology_SA_20_26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-492/" } ], "sourceIdentifier": "zdi-disclosures@trendmicro.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "zdi-disclosures@trendmicro.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
suse-su-2022:1184-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for netatalk", "title": "Title of the patch" }, { "category": "description", "text": "This update for netatalk fixes the following issues:\n \n- CVE-2022-23125: Fixed remote arbitrary code execution related to copyapplfile().\n- CVE-2022-23121: Fixed remote arbitrary code execution related to parse_entries().\n- CVE-2021-31439: Fixed remote arbitrary code execution related to dsi_stream_receive().\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-1184,SUSE-SLE-SDK-12-SP5-2022-1184,SUSE-SLE-WE-12-SP5-2022-1184", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_1184-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:1184-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221184-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:1184-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010700.html" }, { "category": "self", "summary": "SUSE Bug 1197352", "url": "https://bugzilla.suse.com/1197352" }, { "category": "self", "summary": "SUSE CVE CVE-2021-31439 page", "url": "https://www.suse.com/security/cve/CVE-2021-31439/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23121 page", "url": "https://www.suse.com/security/cve/CVE-2022-23121/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23125 page", "url": "https://www.suse.com/security/cve/CVE-2022-23125/" } ], "title": "Security update for netatalk", "tracking": { "current_release_date": "2022-04-13T15:00:22Z", "generator": { "date": "2022-04-13T15:00:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:1184-1", "initial_release_date": "2022-04-13T15:00:22Z", "revision_history": [ { "date": "2022-04-13T15:00:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libatalk12-3.1.0-3.8.1.aarch64", "product": { "name": "libatalk12-3.1.0-3.8.1.aarch64", "product_id": "libatalk12-3.1.0-3.8.1.aarch64" } }, { "category": "product_version", "name": "netatalk-3.1.0-3.8.1.aarch64", "product": { "name": "netatalk-3.1.0-3.8.1.aarch64", "product_id": "netatalk-3.1.0-3.8.1.aarch64" } }, { "category": "product_version", "name": "netatalk-devel-3.1.0-3.8.1.aarch64", "product": { "name": "netatalk-devel-3.1.0-3.8.1.aarch64", "product_id": "netatalk-devel-3.1.0-3.8.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libatalk12-3.1.0-3.8.1.i586", "product": { "name": "libatalk12-3.1.0-3.8.1.i586", "product_id": "libatalk12-3.1.0-3.8.1.i586" } }, { "category": "product_version", "name": "netatalk-3.1.0-3.8.1.i586", "product": { "name": "netatalk-3.1.0-3.8.1.i586", "product_id": "netatalk-3.1.0-3.8.1.i586" } }, { "category": "product_version", "name": "netatalk-devel-3.1.0-3.8.1.i586", "product": { "name": "netatalk-devel-3.1.0-3.8.1.i586", "product_id": "netatalk-devel-3.1.0-3.8.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "libatalk12-3.1.0-3.8.1.ppc64le", "product": { "name": "libatalk12-3.1.0-3.8.1.ppc64le", "product_id": "libatalk12-3.1.0-3.8.1.ppc64le" } }, { "category": "product_version", "name": "netatalk-3.1.0-3.8.1.ppc64le", "product": { "name": "netatalk-3.1.0-3.8.1.ppc64le", "product_id": "netatalk-3.1.0-3.8.1.ppc64le" } }, { "category": "product_version", "name": "netatalk-devel-3.1.0-3.8.1.ppc64le", "product": { "name": "netatalk-devel-3.1.0-3.8.1.ppc64le", "product_id": "netatalk-devel-3.1.0-3.8.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libatalk12-3.1.0-3.8.1.s390", "product": { "name": "libatalk12-3.1.0-3.8.1.s390", "product_id": "libatalk12-3.1.0-3.8.1.s390" } }, { "category": "product_version", "name": "netatalk-3.1.0-3.8.1.s390", "product": { "name": "netatalk-3.1.0-3.8.1.s390", "product_id": "netatalk-3.1.0-3.8.1.s390" } }, { "category": "product_version", "name": "netatalk-devel-3.1.0-3.8.1.s390", "product": { "name": "netatalk-devel-3.1.0-3.8.1.s390", "product_id": "netatalk-devel-3.1.0-3.8.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "libatalk12-3.1.0-3.8.1.s390x", "product": { "name": "libatalk12-3.1.0-3.8.1.s390x", "product_id": "libatalk12-3.1.0-3.8.1.s390x" } }, { "category": "product_version", "name": "netatalk-3.1.0-3.8.1.s390x", "product": { "name": "netatalk-3.1.0-3.8.1.s390x", "product_id": "netatalk-3.1.0-3.8.1.s390x" } }, { "category": "product_version", "name": "netatalk-devel-3.1.0-3.8.1.s390x", "product": { "name": "netatalk-devel-3.1.0-3.8.1.s390x", "product_id": "netatalk-devel-3.1.0-3.8.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libatalk12-3.1.0-3.8.1.x86_64", "product": { "name": "libatalk12-3.1.0-3.8.1.x86_64", "product_id": "libatalk12-3.1.0-3.8.1.x86_64" } }, { "category": "product_version", "name": "netatalk-3.1.0-3.8.1.x86_64", "product": { "name": "netatalk-3.1.0-3.8.1.x86_64", "product_id": "netatalk-3.1.0-3.8.1.x86_64" } }, { "category": "product_version", "name": "netatalk-devel-3.1.0-3.8.1.x86_64", "product": { "name": "netatalk-devel-3.1.0-3.8.1.x86_64", "product_id": "netatalk-devel-3.1.0-3.8.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libatalk12-3.1.0-3.8.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.aarch64" }, "product_reference": "libatalk12-3.1.0-3.8.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libatalk12-3.1.0-3.8.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.ppc64le" }, "product_reference": "libatalk12-3.1.0-3.8.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libatalk12-3.1.0-3.8.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.s390x" }, "product_reference": "libatalk12-3.1.0-3.8.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libatalk12-3.1.0-3.8.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.x86_64" }, "product_reference": "libatalk12-3.1.0-3.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "netatalk-3.1.0-3.8.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.aarch64" }, "product_reference": "netatalk-3.1.0-3.8.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "netatalk-3.1.0-3.8.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.ppc64le" }, "product_reference": "netatalk-3.1.0-3.8.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "netatalk-3.1.0-3.8.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.s390x" }, "product_reference": "netatalk-3.1.0-3.8.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "netatalk-3.1.0-3.8.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.x86_64" }, "product_reference": "netatalk-3.1.0-3.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "netatalk-devel-3.1.0-3.8.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.aarch64" }, "product_reference": "netatalk-devel-3.1.0-3.8.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "netatalk-devel-3.1.0-3.8.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.ppc64le" }, "product_reference": "netatalk-devel-3.1.0-3.8.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "netatalk-devel-3.1.0-3.8.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.s390x" }, "product_reference": "netatalk-devel-3.1.0-3.8.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "netatalk-devel-3.1.0-3.8.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.x86_64" }, "product_reference": "netatalk-devel-3.1.0-3.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libatalk12-3.1.0-3.8.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:libatalk12-3.1.0-3.8.1.x86_64" }, "product_reference": "libatalk12-3.1.0-3.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "netatalk-3.1.0-3.8.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:netatalk-3.1.0-3.8.1.x86_64" }, "product_reference": "netatalk-3.1.0-3.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-31439", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-31439" } ], "notes": [ { "category": "general", "text": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology DiskStation Manager. Authentication is not required to exploit this vulnerablity. The specific flaw exists within the processing of DSI structures in Netatalk. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12326.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libatalk12-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:netatalk-3.1.0-3.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-31439", "url": "https://www.suse.com/security/cve/CVE-2021-31439" }, { "category": "external", "summary": "SUSE Bug 1197352 for CVE-2021-31439", "url": "https://bugzilla.suse.com/1197352" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libatalk12-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:netatalk-3.1.0-3.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libatalk12-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:netatalk-3.1.0-3.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-13T15:00:22Z", "details": "critical" } ], "title": "CVE-2021-31439" }, { "cve": "CVE-2022-23121", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23121" } ], "notes": [ { "category": "general", "text": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parse_entries function. The issue results from the lack of proper error handling when parsing AppleDouble entries. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15819.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libatalk12-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:netatalk-3.1.0-3.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23121", "url": "https://www.suse.com/security/cve/CVE-2022-23121" }, { "category": "external", "summary": "SUSE Bug 1197352 for CVE-2022-23121", "url": "https://bugzilla.suse.com/1197352" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libatalk12-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:netatalk-3.1.0-3.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libatalk12-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:netatalk-3.1.0-3.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-13T15:00:22Z", "details": "critical" } ], "title": "CVE-2022-23121" }, { "cve": "CVE-2022-23125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23125" } ], "notes": [ { "category": "general", "text": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the copyapplfile function. When parsing the len element, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15869.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libatalk12-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:netatalk-3.1.0-3.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23125", "url": "https://www.suse.com/security/cve/CVE-2022-23125" }, { "category": "external", "summary": "SUSE Bug 1197352 for CVE-2022-23125", "url": "https://bugzilla.suse.com/1197352" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libatalk12-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:netatalk-3.1.0-3.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libatalk12-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:netatalk-devel-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libatalk12-3.1.0-3.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:netatalk-3.1.0-3.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-13T15:00:22Z", "details": "critical" } ], "title": "CVE-2022-23125" } ] }
var-202105-1166
Vulnerability from variot
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology DiskStation Manager. Authentication is not required to exploit this vulnerablity. The specific flaw exists within the processing of DSI structures in Netatalk. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12326. Synology DiskStation Manager Is vulnerable to a heap-based buffer overflow. Zero Day Initiative To this vulnerability ZDI-CAN-12326 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Synology DiskStation DS418play is a network device of China Synology Corporation. Provides a storage function. ========================================================================== Ubuntu Security Notice USN-6146-1 June 08, 2023
netatalk vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)
Summary:
Several security issues were fixed in Netatalk.
Software Description: - netatalk: Apple Filing Protocol service
Details:
It was discovered that Netatalk did not properly validate the length of user-supplied data in the DSI structures. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-0194)
It was discovered that Netatalk did not properly handle errors when parsing AppleDouble entries. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2022-43634)
It was discovered that Netatalk did not properly manage memory under certain circumstances. If a user were tricked into opening a specially crafted .appl file, a remote attacker could possibly use this issue to execute arbitrary code. (CVE-2022-45188)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.10: netatalk 3.1.13~ds-2ubuntu0.22.10.1
Ubuntu 22.04 LTS: netatalk 3.1.12~ds-9ubuntu0.22.04.1
Ubuntu 20.04 LTS: netatalk 3.1.12~ds-4ubuntu0.20.04.1
Ubuntu 18.04 LTS (Available with Ubuntu Pro): netatalk 2.2.6-1ubuntu0.18.04.2+esm1
Ubuntu 16.04 LTS (Available with Ubuntu Pro): netatalk 2.2.5-1ubuntu0.2+esm1
Ubuntu 14.04 LTS (Available with Ubuntu Pro): netatalk 2.2.2-1ubuntu2.2+esm1
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-6146-1 CVE-2021-31439, CVE-2022-0194, CVE-2022-23121, CVE-2022-23122, CVE-2022-23123, CVE-2022-23124, CVE-2022-23125, CVE-2022-43634, CVE-2022-45188
Package Information: https://launchpad.net/ubuntu/+source/netatalk/3.1.13~ds-2ubuntu0.22.10.1 https://launchpad.net/ubuntu/+source/netatalk/3.1.12~ds-9ubuntu0.22.04.1 https://launchpad.net/ubuntu/+source/netatalk/3.1.12~ds-4ubuntu0.20.04.1 . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202311-02
https://security.gentoo.org/
Severity: High Title: Netatalk: Multiple Vulnerabilities including root remote code execution Date: November 01, 2023 Bugs: #837623, #881259, #915354 ID: 202311-02
Synopsis
Multiple vulnerabilities have been discovered in Netatalk, which could lead to remote code execution
Background
Netatalk is a kernel level implementation of the AppleTalk Protocol Suite, which allows Unix hosts to act as file, print, and time servers for Apple computers. It includes several script utilities, including etc2ps.sh.
Affected packages
Package Vulnerable Unaffected
net-fs/netatalk < 3.1.18 >= 3.1.18
Description
Multiple vulnerabilities have been discovered in Netatalk. Please review the CVE identifiers referenced below for details.
Impact
Please review the referenced CVE identifiers for details.
Workaround
There is no known workaround at this time.
Resolution
All Netatalk users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-fs/netatalk-3.1.18"
References
[ 1 ] CVE-2021-31439 https://nvd.nist.gov/vuln/detail/CVE-2021-31439 [ 2 ] CVE-2022-0194 https://nvd.nist.gov/vuln/detail/CVE-2022-0194 [ 3 ] CVE-2022-22995 https://nvd.nist.gov/vuln/detail/CVE-2022-22995 [ 4 ] CVE-2022-23121 https://nvd.nist.gov/vuln/detail/CVE-2022-23121 [ 5 ] CVE-2022-23122 https://nvd.nist.gov/vuln/detail/CVE-2022-23122 [ 6 ] CVE-2022-23123 https://nvd.nist.gov/vuln/detail/CVE-2022-23123 [ 7 ] CVE-2022-23124 https://nvd.nist.gov/vuln/detail/CVE-2022-23124 [ 8 ] CVE-2022-23125 https://nvd.nist.gov/vuln/detail/CVE-2022-23125 [ 9 ] CVE-2022-45188 https://nvd.nist.gov/vuln/detail/CVE-2022-45188
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202311-02
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2023 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5 .
For the oldstable distribution (bullseye), these problems have been fixed in version 3.1.12~ds-8+deb11u1.
We recommend that you upgrade your netatalk packages.
For the detailed security status of netatalk please refer to its security tracker page at: https://security-tracker.debian.org/tracker/netatalk
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmULMA8ACgkQEMKTtsN8 TjYw9xAArA2NN4zvH7wC6Itn5ry9kZhQS4BhkCk10WXd0L77k2qzRRTMMw9OBmNn Lk5w3/9oJhqBmtNkLerfBCSMA1aQFQfWOefJnywY/2lYYSS6Uc18Xze78CW4w2O1 /EkK836N6vSVuptjlcvTFGc61XUpbaZJ8CN4ipb2A0tNgp7Ja+Hrz4RgnrS2ppKP gmNuZ5iDcX9N9PohNPTnHc4jQkRscuPN1lsPDrc0OP4E2V7oFm8G7EKexO9BtREq eznaj0Bkcbvddquqz4dnPXOYjkXzoedvGYmI2J5EigIiBMNugL02zExbuhVCmVNl it29LDVAbgNpPgbUi9NRRe9EMXHI+XFgp/xB34jtyq3617SBPLelLBP/e41Bqnua E8C+37uxvIcSgbVibpzhtHkiXTffOpqR3mduXG/VrbuvqO7yzw1sjXrks867wV1Q rQPbX1O99sY+wg69jdyS/QTUQYHkDSGW2Ud+9u7Pv6Bkh/ibXIxHcNiWKaE2LPJi a8mWurmV/r4l325E09jJGxZON4CKiU50+FMKLi8Eo+uXdKDL+dyey9GQBBWQIU0n zg4oJQ/59oGnTib2C52hyZU6xtQbdCceqP2M+4/x75xtCkR5pLcvTnDqRBvnyYBv REbFCz3X46cdxzkbeu/SQWIBLAGXv7yktz8YX8y5Q6h4798FpVY= =jmG2 -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202105-1166", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "diskstation manager", "scope": null, "trust": 1.5, "vendor": "synology", "version": null }, { "model": "diskstation manager", "scope": "lt", "trust": 1.0, "vendor": "synology", "version": "6.2.3-25426-3" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "10.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "11.0" }, { "model": "netatalk", "scope": "lt", "trust": 1.0, "vendor": "netatalk", "version": "3.1.13" }, { "model": "diskstation manager", "scope": "gte", "trust": 1.0, "vendor": "synology", "version": "6.2" }, { "model": "diskstation manager", "scope": "eq", "trust": 0.8, "vendor": "synology", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-492" }, { "db": "JVNDB", "id": "JVNDB-2021-007199" }, { "db": "NVD", "id": "CVE-2021-31439" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Angelboy(@scwuaptx) from DEVCORE Security Team", "sources": [ { "db": "ZDI", "id": "ZDI-21-492" } ], "trust": 0.7 }, "cve": "CVE-2021-31439", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "CVE-2021-31439", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "VHN-391194", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "zdi-disclosures@trendmicro.com", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2021-31439", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2021-31439", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2021-31439", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-31439", "trust": 1.0, "value": "HIGH" }, { "author": "zdi-disclosures@trendmicro.com", "id": "CVE-2021-31439", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-31439", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2021-31439", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202104-2219", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-391194", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-31439", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-492" }, { "db": "VULHUB", "id": "VHN-391194" }, { "db": "VULMON", "id": "CVE-2021-31439" }, { "db": "JVNDB", "id": "JVNDB-2021-007199" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202104-2219" }, { "db": "NVD", "id": "CVE-2021-31439" }, { "db": "NVD", "id": "CVE-2021-31439" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology DiskStation Manager. Authentication is not required to exploit this vulnerablity. The specific flaw exists within the processing of DSI structures in Netatalk. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12326. Synology DiskStation Manager Is vulnerable to a heap-based buffer overflow. Zero Day Initiative To this vulnerability ZDI-CAN-12326 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Synology DiskStation DS418play is a network device of China Synology Corporation. Provides a storage function. ==========================================================================\nUbuntu Security Notice USN-6146-1\nJune 08, 2023\n\nnetatalk vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 22.10\n- Ubuntu 22.04 LTS\n- Ubuntu 20.04 LTS\n- Ubuntu 18.04 LTS (Available with Ubuntu Pro)\n- Ubuntu 16.04 LTS (Available with Ubuntu Pro)\n- Ubuntu 14.04 LTS (Available with Ubuntu Pro)\n\nSummary:\n\nSeveral security issues were fixed in Netatalk. \n\nSoftware Description:\n- netatalk: Apple Filing Protocol service\n\nDetails:\n\nIt was discovered that Netatalk did not properly validate the length of\nuser-supplied data in the DSI structures. This issue only affected Ubuntu 20.04 LTS and Ubuntu\n22.04 LTS. \nThis issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. \n(CVE-2022-0194)\n\nIt was discovered that Netatalk did not properly handle errors when parsing\nAppleDouble entries. This issue only affected\nUbuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and\nUbuntu 22.04 LTS. \nThis issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. \nThis issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04\nLTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. \nThis issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. \nThis issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04\nLTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. \nThis issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu\n22.10. (CVE-2022-43634)\n\nIt was discovered that Netatalk did not properly manage memory under\ncertain circumstances. If a user were tricked into opening a specially\ncrafted .appl file, a remote attacker could possibly use this issue to\nexecute arbitrary code. (CVE-2022-45188)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 22.10:\n netatalk 3.1.13~ds-2ubuntu0.22.10.1\n\nUbuntu 22.04 LTS:\n netatalk 3.1.12~ds-9ubuntu0.22.04.1\n\nUbuntu 20.04 LTS:\n netatalk 3.1.12~ds-4ubuntu0.20.04.1\n\nUbuntu 18.04 LTS (Available with Ubuntu Pro):\n netatalk 2.2.6-1ubuntu0.18.04.2+esm1\n\nUbuntu 16.04 LTS (Available with Ubuntu Pro):\n netatalk 2.2.5-1ubuntu0.2+esm1\n\nUbuntu 14.04 LTS (Available with Ubuntu Pro):\n netatalk 2.2.2-1ubuntu2.2+esm1\n\nIn general, a standard system update will make all the necessary changes. \n\nReferences:\n https://ubuntu.com/security/notices/USN-6146-1\n CVE-2021-31439, CVE-2022-0194, CVE-2022-23121, CVE-2022-23122,\n CVE-2022-23123, CVE-2022-23124, CVE-2022-23125, CVE-2022-43634,\n CVE-2022-45188\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/netatalk/3.1.13~ds-2ubuntu0.22.10.1\n https://launchpad.net/ubuntu/+source/netatalk/3.1.12~ds-9ubuntu0.22.04.1\n https://launchpad.net/ubuntu/+source/netatalk/3.1.12~ds-4ubuntu0.20.04.1\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 202311-02\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n Title: Netatalk: Multiple Vulnerabilities including root remote code execution\n Date: November 01, 2023\n Bugs: #837623, #881259, #915354\n ID: 202311-02\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been discovered in Netatalk, which could\nlead to remote code execution\n\nBackground\n==========\n\nNetatalk is a kernel level implementation of the AppleTalk Protocol\nSuite, which allows Unix hosts to act as file, print, and time servers\nfor Apple computers. It includes several script utilities, including\netc2ps.sh. \n\nAffected packages\n=================\n\nPackage Vulnerable Unaffected\n--------------- ------------ ------------\nnet-fs/netatalk \u003c 3.1.18 \u003e= 3.1.18\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Netatalk. Please review\nthe CVE identifiers referenced below for details. \n\nImpact\n======\n\nPlease review the referenced CVE identifiers for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Netatalk users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-fs/netatalk-3.1.18\"\n\nReferences\n==========\n\n[ 1 ] CVE-2021-31439\n https://nvd.nist.gov/vuln/detail/CVE-2021-31439\n[ 2 ] CVE-2022-0194\n https://nvd.nist.gov/vuln/detail/CVE-2022-0194\n[ 3 ] CVE-2022-22995\n https://nvd.nist.gov/vuln/detail/CVE-2022-22995\n[ 4 ] CVE-2022-23121\n https://nvd.nist.gov/vuln/detail/CVE-2022-23121\n[ 5 ] CVE-2022-23122\n https://nvd.nist.gov/vuln/detail/CVE-2022-23122\n[ 6 ] CVE-2022-23123\n https://nvd.nist.gov/vuln/detail/CVE-2022-23123\n[ 7 ] CVE-2022-23124\n https://nvd.nist.gov/vuln/detail/CVE-2022-23124\n[ 8 ] CVE-2022-23125\n https://nvd.nist.gov/vuln/detail/CVE-2022-23125\n[ 9 ] CVE-2022-45188\n https://nvd.nist.gov/vuln/detail/CVE-2022-45188\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/202311-02\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2023 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n. \n \nFor the oldstable distribution (bullseye), these problems have been fixed\nin version 3.1.12~ds-8+deb11u1. \n\nWe recommend that you upgrade your netatalk packages. \n\nFor the detailed security status of netatalk please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/netatalk\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n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\nREbFCz3X46cdxzkbeu/SQWIBLAGXv7yktz8YX8y5Q6h4798FpVY=\n=jmG2\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2021-31439" }, { "db": "JVNDB", "id": "JVNDB-2021-007199" }, { "db": "ZDI", "id": "ZDI-21-492" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "VULHUB", "id": "VHN-391194" }, { "db": "VULMON", "id": "CVE-2021-31439" }, { "db": "PACKETSTORM", "id": "172803" }, { "db": "PACKETSTORM", "id": "175637" }, { "db": "PACKETSTORM", "id": "174801" } ], "trust": 3.24 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-31439", "trust": 4.4 }, { "db": "ZDI", "id": "ZDI-21-492", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-007199", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-12326", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202104-2219", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2021041363", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021050308", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022042579", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2023.3300", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2023.2863", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-391194", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-31439", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "172803", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "175637", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "174801", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-492" }, { "db": "VULHUB", "id": "VHN-391194" }, { "db": "VULMON", "id": "CVE-2021-31439" }, { "db": "JVNDB", "id": "JVNDB-2021-007199" }, { "db": "PACKETSTORM", "id": "172803" }, { "db": "PACKETSTORM", "id": "175637" }, { "db": "PACKETSTORM", "id": "174801" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202104-2219" }, { "db": "NVD", "id": "CVE-2021-31439" } ] }, "id": "VAR-202105-1166", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-391194" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T12:41:10.217000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Synology-SA-20", "trust": 1.5, "url": "https://www.synology.com/zh-hk/security/advisory/Synology_SA_20_26" }, { "title": "Synology DiskStation DSplay Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=151551" }, { "title": "Debian Security Advisories: DSA-5503-1 netatalk -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=a240e1ca8e9fa1cbfa021929dfc6ac17" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-492" }, { "db": "VULMON", "id": "CVE-2021-31439" }, { "db": "JVNDB", "id": "JVNDB-2021-007199" }, { "db": "CNNVD", "id": "CNNVD-202104-2219" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-122", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "Heap-based buffer overflow (CWE-122) [ Other ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-391194" }, { "db": "JVNDB", "id": "JVNDB-2021-007199" }, { "db": "NVD", "id": "CVE-2021-31439" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.3, "url": "https://www.zerodayinitiative.com/advisories/zdi-21-492/" }, { "trust": 2.5, "url": "https://www.synology.com/zh-hk/security/advisory/synology_sa_20_26" }, { "trust": 1.7, "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00018.html" }, { "trust": 1.1, "url": "https://www.debian.org/security/2023/dsa-5503" }, { "trust": 1.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-31439" }, { "trust": 1.1, "url": "https://security.gentoo.org/glsa/202311-02" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021041363" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/netatalk-buffer-overflow-via-dsi-stream-receive-38073" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2023.2863" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021050308" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022042579" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2023.3300" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-0194" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23124" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23122" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23123" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-45188" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23121" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23125" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-43634" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/netatalk/3.1.13~ds-2ubuntu0.22.10.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/netatalk/3.1.12~ds-9ubuntu0.22.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/netatalk/3.1.12~ds-4ubuntu0.20.04.1" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-6146-1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22995" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-42464" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/netatalk" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-492" }, { "db": "VULHUB", "id": "VHN-391194" }, { "db": "VULMON", "id": "CVE-2021-31439" }, { "db": "JVNDB", "id": "JVNDB-2021-007199" }, { "db": "PACKETSTORM", "id": "172803" }, { "db": "PACKETSTORM", "id": "175637" }, { "db": "PACKETSTORM", "id": "174801" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202104-2219" }, { "db": "NVD", "id": "CVE-2021-31439" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-21-492" }, { "db": "VULHUB", "id": "VHN-391194" }, { "db": "VULMON", "id": "CVE-2021-31439" }, { "db": "JVNDB", "id": "JVNDB-2021-007199" }, { "db": "PACKETSTORM", "id": "172803" }, { "db": "PACKETSTORM", "id": "175637" }, { "db": "PACKETSTORM", "id": "174801" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202104-2219" }, { "db": "NVD", "id": "CVE-2021-31439" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-04-29T00:00:00", "db": "ZDI", "id": "ZDI-21-492" }, { "date": "2021-05-21T00:00:00", "db": "VULHUB", "id": "VHN-391194" }, { "date": "2021-05-21T00:00:00", "db": "VULMON", "id": "CVE-2021-31439" }, { "date": "2022-02-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-007199" }, { "date": "2023-06-08T15:06:14", "db": "PACKETSTORM", "id": "172803" }, { "date": "2023-11-13T21:46:53", "db": "PACKETSTORM", "id": "175637" }, { "date": "2023-09-21T16:23:34", "db": "PACKETSTORM", "id": "174801" }, { "date": "2021-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2021-04-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-2219" }, { "date": "2021-05-21T15:15:07.707000", "db": "NVD", "id": "CVE-2021-31439" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-05-24T00:00:00", "db": "ZDI", "id": "ZDI-21-492" }, { "date": "2021-05-27T00:00:00", "db": "VULHUB", "id": "VHN-391194" }, { "date": "2023-09-21T00:00:00", "db": "VULMON", "id": "CVE-2021-31439" }, { "date": "2022-02-03T09:04:00", "db": "JVNDB", "id": "JVNDB-2021-007199" }, { "date": "2021-04-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2023-06-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-2219" }, { "date": "2023-11-22T20:34:05.293000", "db": "NVD", "id": "CVE-2021-31439" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-2219" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Synology\u00a0DiskStation\u00a0Manager\u00a0 Heap-based buffer overflow vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007199" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202104-2219" } ], "trust": 1.2 } }
ghsa-8292-4xc6-r7cv
Vulnerability from github
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology DiskStation Manager. Authentication is not required to exploit this vulnerablity. The specific flaw exists within the processing of DSI structures in Netatalk. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12326.
{ "affected": [], "aliases": [ "CVE-2021-31439" ], "database_specific": { "cwe_ids": [ "CWE-122", "CWE-787" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-05-21T15:15:00Z", "severity": "HIGH" }, "details": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology DiskStation Manager. Authentication is not required to exploit this vulnerablity. The specific flaw exists within the processing of DSI structures in Netatalk. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12326.", "id": "GHSA-8292-4xc6-r7cv", "modified": "2025-01-14T21:31:41Z", "published": "2022-05-24T19:02:57Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31439" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00018.html" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202311-02" }, { "type": "WEB", "url": "https://www.debian.org/security/2023/dsa-5503" }, { "type": "WEB", "url": "https://www.synology.com/zh-hk/security/advisory/Synology_SA_20_26" }, { "type": "WEB", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-492" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
gsd-2021-31439
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2021-31439", "description": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology DiskStation Manager. Authentication is not required to exploit this vulnerablity. The specific flaw exists within the processing of DSI structures in Netatalk. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12326.", "id": "GSD-2021-31439", "references": [ "https://www.suse.com/security/cve/CVE-2021-31439.html", "https://advisories.mageia.org/CVE-2021-31439.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-31439" ], "details": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology DiskStation Manager. Authentication is not required to exploit this vulnerablity. The specific flaw exists within the processing of DSI structures in Netatalk. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12326.", "id": "GSD-2021-31439", "modified": "2023-12-13T01:23:12.833828Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "zdi-disclosures@trendmicro.com", "ID": "CVE-2021-31439", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "DiskStation Manager", "version": { "version_data": [ { "version_value": "6.1.1-15101-4" } ] } } ] }, "vendor_name": "Synology" } ] } }, "credit": "Angelboy(@scwuaptx) from DEVCORE Security Team", "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology DiskStation Manager. Authentication is not required to exploit this vulnerablity. The specific flaw exists within the processing of DSI structures in Netatalk. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12326." } ] }, "impact": { "cvss": { "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122: Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-492/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-492/" }, { "name": "https://www.synology.com/zh-hk/security/advisory/Synology_SA_20_26", "refsource": "MISC", "url": "https://www.synology.com/zh-hk/security/advisory/Synology_SA_20_26" }, { "name": "[debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00018.html" }, { "name": "DSA-5503", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2023/dsa-5503" }, { "name": "GLSA-202311-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202311-02" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "6.2.3-25426-3", "versionStartIncluding": "6.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netatalk:netatalk:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.1.13", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "zdi-disclosures@trendmicro.com", "ID": "CVE-2021-31439" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology DiskStation Manager. Authentication is not required to exploit this vulnerablity. The specific flaw exists within the processing of DSI structures in Netatalk. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12326." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-787" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-492/", "refsource": "MISC", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-492/" }, { "name": "https://www.synology.com/zh-hk/security/advisory/Synology_SA_20_26", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://www.synology.com/zh-hk/security/advisory/Synology_SA_20_26" }, { "name": "[debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00018.html" }, { "name": "DSA-5503", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2023/dsa-5503" }, { "name": "GLSA-202311-02", "refsource": "GENTOO", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202311-02" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } }, "lastModifiedDate": "2023-11-22T20:34Z", "publishedDate": "2021-05-21T15:15Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.