Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in connection management functionality in Synology Drive Client before 3.4.0-15721 allows local users with administrator privileges to crash the client via unspecified vectors.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-53882 Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in connection management functionality in Synology Drive Client before 3.4.0-15721 allows local users with administrator privileges to crash the client via unspecified vectors.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 08 Oct 2024 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Synology
Synology drive Client
CPEs cpe:2.3:a:synology:drive_client:*:*:*:*:*:desktop:*:*
Vendors & Products Synology
Synology drive Client

Thu, 26 Sep 2024 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Sep 2024 03:45:00 +0000

Type Values Removed Values Added
Description Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in connection management functionality in Synology Drive Client before 3.4.0-15721 allows local users with administrator privileges to crash the client via unspecified vectors.
Weaknesses CWE-120
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: synology

Published:

Updated: 2024-09-26T14:40:39.040Z

Reserved: 2024-09-24T08:40:22.263Z

Link: CVE-2022-49040

cve-icon Vulnrichment

Updated: 2024-09-26T14:40:35.465Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-26T04:15:05.390

Modified: 2024-10-08T16:07:11.210

Link: CVE-2022-49040

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.