A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to execute code.
We have already fixed the vulnerability in the following versions:
QTS 5.2.1.2930 build 20241025 and later
QuTS hero h5.2.1.2929 build 20241025 and later
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.qnap.com/en/security-advisory/qsa-24-43 |
![]() ![]() |
History
Fri, 22 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 22 Nov 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to execute code. We have already fixed the vulnerability in the following versions: QTS 5.2.1.2930 build 20241025 and later QuTS hero h5.2.1.2929 build 20241025 and later | |
Title | QTS, QuTS hero | |
Weaknesses | CWE-120 CWE-121 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: qnap
Published: 2024-11-22T15:32:49.741Z
Updated: 2024-11-22T17:05:00.765Z
Reserved: 2024-05-31T08:46:24.563Z
Link: CVE-2024-37049

Updated: 2024-11-22T16:56:56.884Z

Status : Received
Published: 2024-11-22T16:15:24.027
Modified: 2024-11-22T16:15:24.027
Link: CVE-2024-37049

No data.