Synology-SA-18:61 Magellan

Publish Time: 2018-12-18 11:58:48 UTC+8

Last Updated: 2020-06-18 15:28:02 UTC+8

Severity
Moderate
Status
Ongoing

Abstract

Magellan vulnerability allows remote authenticated users to conduct denial-of-service attacks or possibly execute arbitrary code via a susceptible version of Synology products.

Affected Products

Product Severity Fixed Release Availability
DSM 6.2 Moderate Upgrade to 6.2.2-24922 or above.
DSM 6.1 Moderate Upgrade to 6.2.2-24922 or above.
DSM 5.2 Moderate Upgrade to 6.2.2-24922 or above.
SkyNAS Moderate Will not fix.
VS960HD Moderate Pending
SRM 1.2 Moderate Upgrade to 1.2.1-7779 or above.
Active Backup Moderate Ongoing
Download Station Moderate Ongoing
Log Center Moderate Ongoing
Mail Server Moderate Ongoing
MailPlus Moderate Upgrade to DSM 6.2.2-24922 or above.
MailPlus Server Moderate Upgrade to DSM 6.2.2-24922 or above.
Python 3 Moderate Ongoing
Surveillance Station Moderate Ongoing
Synology Application Service Moderate Ongoing
Universal Search Moderate Ongoing

Mitigation

None

Detail

  • CVE-2018-20346
    • Severity: Moderate
    • CVSS3 Base Score: 6.3
    • CVSS3 Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
    • SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.

Reference

Revision

Revision Date Description
1 2018-12-18 Initial public release.
2 2018-12-22 Disclosed vulnerability details.
3 2019-12-18 Update for DSM 6.2 is now available in Affected Products.
4 2020-06-18 Update for SRM 1.2 is now available in Affected Products.