CVE-2023-5748

Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in cgi component in Synology SSL VPN Client before 1.4.7-0687 allows local users to conduct denial-of-service attacks via unspecified vectors.
Configurations

Configuration 1 (hide)

cpe:2.3:a:synology:ssl_vpn_client:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:42

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.5
v2 : unknown
v3 : 3.3
References () https://www.synology.com/en-global/security/advisory/Synology_SA_23_12 - Vendor Advisory () https://www.synology.com/en-global/security/advisory/Synology_SA_23_12 - Vendor Advisory

14 Nov 2023, 18:41

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:a:synology:ssl_vpn_client:*:*:*:*:*:*:*:*
References () https://www.synology.com/en-global/security/advisory/Synology_SA_23_12 - () https://www.synology.com/en-global/security/advisory/Synology_SA_23_12 - Vendor Advisory
CWE CWE-120
First Time Synology
Synology ssl Vpn Client

07 Nov 2023, 12:14

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-07 04:24

Updated : 2024-11-21 08:42


NVD link : CVE-2023-5748

Mitre link : CVE-2023-5748

CVE.ORG link : CVE-2023-5748


JSON object : View

Products Affected

synology

  • ssl_vpn_client
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')