Synology-SA-21:17 Samba

Publish Time: UTC+8

Last Updated: UTC+8

Severity
Moderate
Status
Accepted

Abstract

A vulnerability allows remote authenticated users to bypass security constraint via a susceptible version of DiskStation Manager (DSM) or Synology Router Manager (SRM).

Affected Products

Product Severity Fixed Release Availability
DSM 6.2 Moderate Will not fix
SRM 1.2 Moderate Upgrade to 1.3.1-9346 or above.
VS Firmware 2.3 Not affected N/A
SMB Service for DSM 7.0 Moderate Upgrade to 4.10.18-0417 or above.

Mitigation

None

Detail

  • CVE-2021-20254
    • Severity: Moderate
    • CVSS3 Base Score: 6.8
    • CVSS3 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
    • CWE-125: Out-of-bounds Read
    • A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added to the mapping cache. This could cause the calling code to return those values into the process token that stores the group membership for a user. The highest threat from this vulnerability is to data confidentiality and integrity.

Reference

Revision

Revision Date Description
1 2021-05-03 Initial public release.
2 2022-02-17 Added SMB Service for DSM 7.0 to Affected Products.
3 2025-12-04 Updated Fixed Release Availability for SRM 1.2 and DSM 6.2.