Description
Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in cgi component in Synology SSL VPN Client before 1.4.7-0687 allows local users to conduct denial-of-service attacks via unspecified vectors.
Published: 2023-10-24
Score: 3.3 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-58034 Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in cgi component in Synology SSL VPN Client before 1.4.7-0687 allows local users to conduct denial-of-service attacks via unspecified vectors.
History

Wed, 18 Sep 2024 20:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Synology Ssl Vpn Client
cve-icon MITRE

Status: PUBLISHED

Assigner: synology

Published:

Updated: 2024-09-17T14:18:30.321Z

Reserved: 2023-10-24T06:10:16.429Z

Link: CVE-2023-5748

cve-icon Vulnrichment

Updated: 2024-08-02T08:07:32.620Z

cve-icon NVD

Status : Modified

Published: 2023-11-07T04:24:19.670

Modified: 2024-11-21T08:42:24.430

Link: CVE-2023-5748

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses