Multiple vulnerabilities in QNAP devices running Samba



Published: 2023-03-30
Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2022-3437
CVE-2022-3592
CWE-ID CWE-122
CWE-61
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
QuTScloud
Operating systems & Components / Operating system

QVP (QVR Pro appliances)
Hardware solutions / Firmware

QuTS hero
Hardware solutions / Firmware

QVR
Client/Desktop applications / Other client software

QNAP QTS
Server applications / File servers (FTP/HTTP)

Vendor QNAP Systems, Inc.

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Heap-based buffer overflow

EUVDB-ID: #VU68701

Risk: Low

CVSSv3.1: 3.7 [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-3437

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. A remote user can send specially crafted data to the application, trigger a heap-based buffer overflow and perform a denial of service (DoS) attack.


Mitigation

Install update from vendor's website.

Vulnerable software versions

QuTScloud: All versions

QVP (QVR Pro appliances): All versions

QVR: All versions

QuTS hero: before h5.0.1.2348 build 20230324

QNAP QTS: before 5.0.1.2346 20230322

CPE2.3 External links

http://www.qnap.com/en/security-advisory/qsa-23-02


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) UNIX symbolic link following

EUVDB-ID: #VU68700

Risk: Medium

CVSSv3.1: 4 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-3592

CWE-ID: CWE-61 - UNIX Symbolic Link (Symlink) Following

Exploit availability: No

Description

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to a symlink following issue. A remote user with access to the exported part of the file system under a share via SMB1 unix extensions or NFS can create symlinks to files outside of the smbd configured share path and access otherwise restricted files on the server. 

Mitigation

Install update from vendor's website.

Vulnerable software versions

QuTScloud: All versions

QVP (QVR Pro appliances): All versions

QVR: All versions

QuTS hero: before h5.0.1.2348 build 20230324

QNAP QTS: before 5.0.1.2346 20230322

CPE2.3 External links

http://www.qnap.com/en/security-advisory/qsa-23-02


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###