A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.1.2.2533 build 20230926 and later
QuTS hero h5.1.2.2534 build 20230927 and later
QuTScloud c5.1.5.2651 and later
References
Link | Resource |
---|---|
https://www.qnap.com/en/security-advisory/qsa-23-38 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
06 Feb 2024, 19:33
Type | Values Removed | Values Added |
---|---|---|
First Time |
Qnap quts Hero
Qnap Qnap qutscloud Qnap qts |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
References | () https://www.qnap.com/en/security-advisory/qsa-23-38 - Vendor Advisory | |
CPE | cpe:2.3:o:qnap:quts_hero:h5.1.1.2488:build_20230812:*:*:*:*:*:* cpe:2.3:o:qnap:qts:5.1.1.2491:build_20230815:*:*:*:*:*:* cpe:2.3:o:qnap:qts:5.1.0.2444:build_20230629:*:*:*:*:*:* cpe:2.3:o:qnap:qts:5.1.0.2418:build_20230603:*:*:*:*:*:* cpe:2.3:o:qnap:quts_hero:h5.1.0.2466:build_20230721:*:*:*:*:*:* cpe:2.3:o:qnap:qts:5.1.0.2348:build_20230325:*:*:*:*:*:* cpe:2.3:o:qnap:qts:5.1.0.2399:build_20230515:*:*:*:*:*:* cpe:2.3:o:qnap:qts:5.1.0.2466:build_20230721:*:*:*:*:*:* cpe:2.3:o:qnap:quts_hero:h5.1.0.2424:build_20230609:*:*:*:*:*:* cpe:2.3:o:qnap:quts_hero:h5.1.2.2534:-:*:*:*:*:*:* cpe:2.3:o:qnap:qts:5.1.2.2533:-:*:*:*:*:*:* cpe:2.3:o:qnap:quts_hero:h5.1.0.2409:build_20230525:*:*:*:*:*:* cpe:2.3:o:qnap:qutscloud:c5.1.0.2498:build_20230822:*:*:*:*:*:* cpe:2.3:o:qnap:quts_hero:h5.1.0.2453:build_20230708:*:*:*:*:*:* |
02 Feb 2024, 16:30
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-02 16:15
Updated : 2024-02-28 20:54
NVD link : CVE-2023-41276
Mitre link : CVE-2023-41276
CVE.ORG link : CVE-2023-41276
JSON object : View
Products Affected
qnap
- qts
- qutscloud
- quts_hero