A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to execute code via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.1.8.2823 build 20240712 and later
QuTS hero h5.1.8.2823 build 20240712 and later
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://www.qnap.com/en/security-advisory/qsa-24-33 | 
                     | 
            
History
                    Fri, 20 Sep 2024 17:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Qnap
         Qnap qts Qnap quts Hero  | 
|
| CPEs | cpe:2.3:o:qnap:qts:5.1.0.2348:build_20230325:*:*:*:*:*:* cpe:2.3:o:qnap:qts:5.1.0.2399:build_20230515:*:*:*:*:*:* cpe:2.3:o:qnap:qts:5.1.0.2418:build_20230603:*:*:*:*:*:* cpe:2.3:o:qnap:qts:5.1.0.2444:build_20230629:*:*:*:*:*:* cpe:2.3:o:qnap:qts:5.1.0.2466:build_20230721:*:*:*:*:*:* cpe:2.3:o:qnap:qts:5.1.1.2491:build_20230815:*:*:*:*:*:* cpe:2.3:o:qnap:qts:5.1.2.2533:build_20230926:*:*:*:*:*:* cpe:2.3:o:qnap:qts:5.1.3.2578:build_20231110:*:*:*:*:*:* cpe:2.3:o:qnap:qts:5.1.4.2596:build_20231128:*:*:*:*:*:* cpe:2.3:o:qnap:qts:5.1.5.2645:build_20240116:*:*:*:*:*:* cpe:2.3:o:qnap:qts:5.1.5.2679:build_20240219:*:*:*:*:*:* cpe:2.3:o:qnap:qts:5.1.6.2722:build_20240402:*:*:*:*:*:* cpe:2.3:o:qnap:qts:5.1.7.2770:build_20240520:*:*:*:*:*:* cpe:2.3:o:qnap:quts_hero:h5.1.0.2409:build_20230525:*:*:*:*:*:* cpe:2.3:o:qnap:quts_hero:h5.1.0.2424:build_20230609:*:*:*:*:*:* cpe:2.3:o:qnap:quts_hero:h5.1.0.2453:build_20230708:*:*:*:*:*:* cpe:2.3:o:qnap:quts_hero:h5.1.0.2466:build_20230721:*:*:*:*:*:* cpe:2.3:o:qnap:quts_hero:h5.1.1.2488:build_20230812:*:*:*:*:*:* cpe:2.3:o:qnap:quts_hero:h5.1.2.2534:build_20230927:*:*:*:*:*:* cpe:2.3:o:qnap:quts_hero:h5.1.3.2578:build_20231110:*:*:*:*:*:* cpe:2.3:o:qnap:quts_hero:h5.1.4.2596:build_20231128:*:*:*:*:*:* cpe:2.3:o:qnap:quts_hero:h5.1.5.2647:build_20240118:*:*:*:*:*:* cpe:2.3:o:qnap:quts_hero:h5.1.5.2680:build_20240220:*:*:*:*:*:* cpe:2.3:o:qnap:quts_hero:h5.1.6.2734:build_20240414:*:*:*:*:*:* cpe:2.3:o:qnap:quts_hero:h5.1.7.2770:build_20240520:*:*:*:*:*:* cpe:2.3:o:qnap:quts_hero:h5.1.7.2788:build_20240607:*:*:*:*:*:* cpe:2.3:o:qnap:quts_hero:h5.1.7.2794:build_20240613:*:*:*:*:*:*  | 
|
| Vendors & Products | 
        
        Qnap
         Qnap qts Qnap quts Hero  | 
|
| Metrics | 
        
        cvssV3_1
         
  | 
Fri, 06 Sep 2024 17:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Fri, 06 Sep 2024 16:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.8.2823 build 20240712 and later QuTS hero h5.1.8.2823 build 20240712 and later | |
| Title | QTS, QuTS hero | |
| Weaknesses | CWE-120 CWE-122  | 
|
| References | 
         | |
| Metrics | 
        
        cvssV4_0
         
  | 
Status: PUBLISHED
Assigner: qnap
Published: 2024-09-06T16:27:41.126Z
Updated: 2024-09-06T17:05:19.113Z
Reserved: 2024-04-18T08:14:16.552Z
Link: CVE-2024-32763
Updated: 2024-09-06T17:05:15.461Z
Status : Analyzed
Published: 2024-09-06T17:15:15.920
Modified: 2024-09-20T16:49:08.883
Link: CVE-2024-32763
No data.