Stack-based buffer overflow vulnerability in frontend/main.c in faad2 before 2.2.7.1 allow local attackers to execute arbitrary code via filename and pathname options.
References
Link | Resource |
---|---|
https://github.com/knik0/faad2/commit/720f7004d6c4aabee19aad16e7c456ed76a3ebfa | Patch |
https://www.synology.com/security/advisory/Synology_SA_20_26 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
|
History
26 Jun 2023, 19:20
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:faad2_project:faad2:*:*:*:*:*:*:*:* | |
First Time |
Faad2 Project
Faad2 Project faad2 |
|
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 7.8 |
CWE | CWE-787 | |
References | (MISC) https://github.com/knik0/faad2/commit/720f7004d6c4aabee19aad16e7c456ed76a3ebfa - Patch |
Information
Published : 2021-02-26 22:15
Updated : 2024-02-28 18:08
NVD link : CVE-2021-26567
Mitre link : CVE-2021-26567
CVE.ORG link : CVE-2021-26567
JSON object : View
Products Affected
synology
- diskstation_manager
- skynas_firmware
- vs960hd
- vs960hd_firmware
- diskstation_manager_unified_controller
- skynas
- uc3200
faad2_project
- faad2