Publish Time: 2022-10-27 13:44:08 UTC+8
Last Updated: 2023-01-13 10:05:54 UTC+8
CVE-2022-3437 allows remote authenticated users to conduct denial-of-service attacks via a susceptible version of Synology DiskStation Manager (DSM), SMB Service and Synology Directory Server.
None of Synology's products are affected by CVE-2022-3592 as this vulnerability only affect Samba 4.17 and later.
|Product||Severity||Fixed Release Availability|
|SRM 1.3||Not affected||N/A|
|SRM 1.2||Not affected||N/A|
|DSMUC 3.1||Not affected||N/A|
|VS Firmware 3.0||Not affected||N/A|
|VS Firmware 2.3||Not affected||N/A|
|SMB Service for DSM 7.1||Moderate||Ongoing|
|SMB Service for DSM 7.0||Moderate||Ongoing|
|Synology Directory Server for DSM 7.1||Moderate||Ongoing|
|Synology Directory Server for DSM 7.0||Moderate||Ongoing|
|Synology Directory Server for DSM 6.2||Moderate||Ongoing|
- Severity: Moderate
- CVSS3 Base Score: 5.9
- CVSS3 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L
- A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory when presented with a maliciously small packet. This flaw allows a remote user to send specially crafted malicious data to the application, possibly resulting in a denial of service (DoS) attack.
- Severity: Not affected
- CVSS3 Base Score: 0.0
- CVSS3 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
- A symlink following vulnerability was found in Samba, where a user can create a symbolic link that will make 'smbd' escape the configured share path. This flaw allows a remote user with access to the exported part of the file system under a share via SMB1 unix extensions or NFS to create symlinks to files outside the 'smbd' configured share path and gain access to another restricted server's filesystem.
|1||2022-10-27||Initial public release.|