Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in vss service component in Synology Drive Client before 3.5.0-16084 allows remote attackers to overwrite trivial buffers and crash the client via unspecified vectors.
Metrics
Affected Vendors & Products
References
History
Tue, 08 Oct 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Synology drive Client
|
|
CPEs | cpe:2.3:a:synology:drive_client:*:*:*:*:*:desktop:*:* | |
Vendors & Products |
Synology drive Client
|
Thu, 26 Sep 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Synology
Synology drive |
|
CPEs | cpe:2.3:a:synology:drive:*:*:*:*:*:*:*:* | |
Vendors & Products |
Synology
Synology drive |
|
Metrics |
ssvc
|
Thu, 26 Sep 2024 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in vss service component in Synology Drive Client before 3.5.0-16084 allows remote attackers to overwrite trivial buffers and crash the client via unspecified vectors. | |
Weaknesses | CWE-120 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: synology
Published: 2024-09-26T03:31:38.479Z
Updated: 2024-09-26T14:53:50.864Z
Reserved: 2024-09-24T08:35:52.121Z
Link: CVE-2023-52946
Vulnrichment
Updated: 2024-09-26T14:53:45.955Z
NVD
Status : Analyzed
Published: 2024-09-26T04:15:05.863
Modified: 2024-10-08T15:55:07.543
Link: CVE-2023-52946
Redhat
No data.