A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.0.1.2425 build 20230609 and later
QTS 5.1.0.2444 build 20230629 and later
QTS 4.5.4.2467 build 20230718 and later
QuTS hero h5.0.1.2515 build 20230907 and later
QuTS hero h5.1.0.2424 build 20230609 and later
QuTS hero h4.5.4.2476 build 20230728 and later
QuTScloud c5.1.0.2498 and later
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.qnap.com/en/security-advisory/qsa-23-37 |
History
Thu, 19 Sep 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: qnap
Published: 2023-10-06T16:36:33.766Z
Updated: 2024-09-19T14:40:09.223Z
Reserved: 2023-05-16T10:44:49.056Z
Link: CVE-2023-32972
Vulnrichment
Updated: 2024-08-02T15:32:46.551Z
NVD
Status : Modified
Published: 2023-10-06T17:15:12.170
Modified: 2024-11-21T08:04:19.263
Link: CVE-2023-32972
Redhat
No data.