5.8
CVSSv2

CVE-2021-31439

Published: 21/05/2021 Updated: 22/11/2023
CVSS v2 Base Score: 5.8 | Impact Score: 6.4 | Exploitability Score: 6.5
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 516
Vector: AV:A/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

This vulnerability allows network-adjacent malicious users to execute arbitrary code on affected installations of Synology DiskStation Manager. Authentication is not required to exploit this vulnerablity. The specific flaw exists within the processing of DSI structures in Netatalk. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12326.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

synology diskstation manager

debian debian linux 10.0

debian debian linux 11.0

netatalk netatalk

Vendor Advisories

Multiple security issues were discovered in Netatalk, an implementation of the Apple Filing Protocol (AFP) for offering file service (mainly) to macOS clients, which may result in the execution of arbitrary code or information disclosure For the oldstable distribution (bullseye), these problems have been fixed in version 3112~ds-8+deb11u1 We re ...