CVE-2017-11157
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Multiple untrusted search path vulnerabilities in the installer in Synology Cloud Station Backup before 4.2.5-4396 on Windows allow local attackers to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) shfolder.dll, (2) ntmarta.dll, (3) secur32.dll or (4) dwmapi.dll file in the current working directory.
Múltiples vulnerabilidades de ruta de búsqueda no confiable en el instalador en Synology Cloud Station Backup anterior a la versión 4.2.5-4396 en Windows, permiten a los atacantes locales ejecutar código arbitrario y conducir ataques de secuestro de DLL mediante un archivo de tipo caballo de Troya en las bibliotecas (1) shfolder.dll, (2) ntmarta.dll , (3) secur32.dll o (4) dwmapi.dll, en el directorio de trabajo actual
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-07-10 CVE Reserved
- 2017-08-30 CVE Published
- 2024-08-02 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-426: Untrusted Search Path
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.synology.com/en-global/support/security/Synology_SA_17_50_Cloud_Station_Backup | 2017-09-05 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Synology Search vendor "Synology" | Cloud Station Backup Search vendor "Synology" for product "Cloud Station Backup" | <= 4.2.4-4393 Search vendor "Synology" for product "Cloud Station Backup" and version " <= 4.2.4-4393" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | - | - |
Safe
|