QNAP QTS / QuTS hero Buffer Overflow (QSA-21-50)

critical Nessus Plugin ID 159577

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

The version of QNAP QTS or QuTS hero on the remote host is affected by a heap-based buffer overflow vulnerability in devices that have Apple File Protocol (AFP) enabled. This allows attackers to execute arbitrary code.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Apply the workaround and upgrade to the relevant fixed version referenced in the QSA-21-50 advisory.

See Also

https://www.qnap.com/en/security-advisory/qsa-21-50

Plugin Details

Severity: Critical

ID: 159577

File Name: qnap_qts_quts_hero_qsa-21-50.nasl

Version: 1.4

Type: combined

Family: Misc.

Published: 4/7/2022

Updated: 8/12/2022

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

CVSS Score Rationale: Score from a more in depth analysis done by tenable

CVSS v2

Risk Factor: High

Base Score: 9

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: manual

CVSS v3

Risk Factor: Critical

Base Score: 9.9

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:qnap:qts, cpe:/o:qnap:qts, cpe:/o:qnap:quts_hero

Required KB Items: Settings/ParanoidReport

Patch Publication Date: 11/19/2021

Vulnerability Publication Date: 11/19/2021