Products
QNAP QTS
- 5.1.8.2823 build 20240712 and later
QNAP QuTS hero
- h5.1.8.2823 build 20240712 and later
Source
security@qnapsecurity.com.tw
Tags
CVE-2024-32763 details
Published : Sept. 6, 2024, 5:15 p.m.
Last Modified : Sept. 6, 2024, 5:15 p.m.
Last Modified : Sept. 6, 2024, 5:15 p.m.
Description
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.8.2823 build 20240712 and later QuTS hero h5.1.8.2823 build 20240712 and later
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') | The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow. |
References
URL | Source |
---|---|
https://www.qnap.com/en/security-advisory/qsa-24-33 | security@qnapsecurity.com.tw |
This website uses the NVD API, but is not approved or certified by it.