CVE-2021-31439
Summary
| CVE | CVE-2021-31439 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-05-21 15:15:00 UTC |
| Updated | 2023-11-22 20:34:00 UTC |
| Description | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology DiskStation Manager. Authentication is not required to exploit this vulnerablity. The specific flaw exists within the processing of DSI structures in Netatalk. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12326. |
NVD Known Affected Configurations (CPE 2.3)
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 181789 Debian Security Update for netatalk (DLA 3426-1)
- 199403 Ubuntu Security Notification for Netatalk Vulnerabilities (USN-6146-1)
- 502549 Alpine Linux Security Update for netatalk
- 505087 Alpine Linux Security Update for netatalk
- 6000181 Debian Security Update for netatalk (DSA 5503-1)
- 710785 Gentoo Linux Netatalk Multiple Vulnerabilities including root Remote Code Execution (RCE) (GLSA 202311-02)
- 752037 SUSE Enterprise Linux Security Update for netatalk (SUSE-SU-2022:1184-1)