Page 16 of 81 results (0.007 seconds)

CVSS: 10.0EPSS: 4%CPEs: 6EXPL: 0

A buffer overflow vulnerability in external device function in QNAP QTS version 4.2.6 build 20171026, 4.3.3.0378 build 20171117, 4.3.4.0387 (Beta 2) build 20171116 and earlier could allow remote attackers to execute arbitrary code on NAS devices. Una vulnerabilidad de desbordamiento de búfer en la función del dispositivo externo en QNAP QTS 4.2.6 build 20171026, 4.3.3.0378 build 20171117, 4.3.4.0387 (Beta 2) build 20171116 y anteriores podría permitir que los atacantes remotos ejecuten código arbitrario en los dispositivos NAS. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of QNAP QTS. Authentication is not required to exploit this vulnerability. The specific flaw exists within devRequest.cgi. When parsing the password parameter, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. • http://www.securitytracker.com/id/1040018 https://www.qnap.com/zh-tw/security-advisory/nas-201712-15 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 4%CPEs: 6EXPL: 0

A buffer overflow vulnerability in FTP service in QNAP QTS version 4.2.6 build 20171026, 4.3.3.0378 build 20171117, 4.3.4.0387 (Beta 2) build 20171116 and earlier could allow remote attackers to execute arbitrary code on NAS devices. Una vulnerabilidad de desbordamiento de búfer en el servicio FTP de QNAP QTS, en sus versiones 4.2.6 build 20171026, 4.3.3.0378 build 20171117, 4.3.4.0387 (Beta 2) build 20171116 y anteriores podría permitir que atacantes remotos ejecuten código arbitrario en dispositivos NAS. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of QNAP QTS NASFTPD. Authentication is not required to exploit this vulnerability. The specific flaw exists within the NASFTPD service, which listens on TCP port 21 by default. When parsing the USER command, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. • http://www.securitytracker.com/id/1040018 https://www.qnap.com/zh-tw/security-advisory/nas-201712-15 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 4%CPEs: 6EXPL: 0

A buffer overflow vulnerability in login function in QNAP QTS version 4.2.6 build 20171026, 4.3.3.0378 build 20171117, 4.3.4.0387 (Beta 2) build 20171116 and earlier could allow remote attackers to execute arbitrary code on NAS devices. Una vulnerabilidad de desbordamiento de búfer en la función de inicio de sesión en QNAP QTS 4.2.6 build 20171026, 4.3.3.0378 build 20171117, 4.3.4.0387 (Beta 2) build 20171116 y anteriores podría permitir que los atacantes remotos ejecuten código arbitrario en los dispositivos NAS. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of QNAP QTS. Authentication is not required to exploit this vulnerability. The specific flaw exists within authLogin.cgi. When parsing the X-Forwarded-For header, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. • http://www.securitytracker.com/id/1040018 https://www.qnap.com/zh-tw/security-advisory/nas-201712-15 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 4%CPEs: 6EXPL: 0

A buffer overflow vulnerability in password function in QNAP QTS version 4.2.6 build 20171026, 4.3.3.0378 build 20171117, 4.3.4.0387 (Beta 2) build 20171116 and earlier could allow remote attackers to execute arbitrary code on NAS devices. Una vulnerabilidad de desbordamiento de búfer en la función de contraseña en QNAP QTS 4.2.6 build 20171026, 4.3.3.0378 build 20171117, 4.3.4.0387 (Beta 2) build 20171116 y anteriores podría permitir que los atacantes remotos ejecuten código arbitrario en los dispositivos NAS. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of QNAP QTS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the USER_NAME parameter provided to the change_password.cgi endpoint. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. • http://www.securitytracker.com/id/1040018 https://www.qnap.com/zh-tw/security-advisory/nas-201712-15 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 4%CPEs: 6EXPL: 0

A buffer overflow vulnerability in password function in QNAP QTS version 4.2.6 build 20171026, 4.3.3.0378 build 20171117, 4.3.4.0387 (Beta 2) build 20171116 and earlier could allow remote attackers to execute arbitrary code on NAS devices. Una vulnerabilidad de desbordamiento de búfer en la función de contraseña en QNAP QTS 4.2.6 build 20171026, 4.3.3.0378 build 20171117, 4.3.4.0387 (Beta 2) build 20171116 y anteriores podría permitir que los atacantes remotos ejecuten código arbitrario en los dispositivos NAS. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of QNAP QTS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the lang parameter provided to the sysinfoReq.cgi endpoint. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. • http://www.securitytracker.com/id/1040018 https://www.qnap.com/zh-tw/security-advisory/nas-201712-15 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •