Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in vss service component in Synology Drive Client before 3.5.0-16084 allows remote attackers to overwrite trivial buffers and crash the client via unspecified vectors.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 08 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Synology drive Client
CPEs cpe:2.3:a:synology:drive_client:*:*:*:*:*:desktop:*:*
Vendors & Products Synology drive Client

Thu, 26 Sep 2024 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Synology
Synology drive
CPEs cpe:2.3:a:synology:drive:*:*:*:*:*:*:*:*
Vendors & Products Synology
Synology drive
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Sep 2024 03:45:00 +0000

Type Values Removed Values Added
Description Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in vss service component in Synology Drive Client before 3.5.0-16084 allows remote attackers to overwrite trivial buffers and crash the client via unspecified vectors.
Weaknesses CWE-120
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: synology

Published:

Updated: 2024-09-26T14:53:50.864Z

Reserved: 2024-09-24T08:35:52.121Z

Link: CVE-2023-52946

cve-icon Vulnrichment

Updated: 2024-09-26T14:53:45.955Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-26T04:15:05.863

Modified: 2024-10-08T15:55:07.543

Link: CVE-2023-52946

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.