#VU16039 Buffer overflow in QNAP QTS - CVE-2018-14749


Vulnerability identifier: #VU16039

Vulnerability risk: High

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2018-14749

CWE-ID: CWE-120

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
QNAP QTS
Server applications / File servers (FTP/HTTP)

Vendor: QNAP Systems, Inc.

Description
The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.

The vulnerability exists due to buffer overflow. A remote attacker can trigger memory corruption and cause the service to crash or execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation
The vulnerability has been fixed in the versions 4.3.5 build 20181110, 4.3.4 build 20181026, 4.3.3 build 20181029, 4.2.6 build 20181026.

Vulnerable software versions

QNAP QTS: 4.2.6 2018082 - 4.2.6 20180711, 4.3.3 20170516 - 4.3.4.0589 20180520


External links
https://www.qnap.com/en/security-advisory/nas-201811-22


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability