Synology-SA-21:21 Audio Station
Publish Time: 2021-06-16 16:05:29 UTC+8
Last Updated: 2022-07-28 15:17:36 UTC+8
- Severity
- Important
- Status
- Resolved
Abstract
A vulnerability allows remote attackers to execute arbitrary commands via a susceptible version of Audio Station.
Affected Products
Product | Severity | Fixed Release Availability |
---|---|---|
Audio Station for DSM 6.2 | Important | Upgrade to 6.5.4-3367 or above. |
Mitigation
None
Detail
CVE-2022-27612
- Severity: Important
- CVSS3 Base Score: 7.3
- CVSS3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
- Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in cgi component in Synology Audio Station before 6.5.4-3367 allows remote attackers to execute arbitrary commands via unspecified vectors.
CVE-2022-27611
- Severity: Moderate
- CVSS3 Base Score: 5.4
- CVSS3 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
- Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in webapi component in Synology Audio Station before 6.5.4-3367 allows remote authenticated users to delete arbitrary files via unspecified vectors.
Acknowledgement
Qian Chen (@cq674350529) from Codesafe Team of Legendsec at Qi'anxin Group
Revision
Revision | Date | Description |
---|---|---|
1 | 2021-06-16 | Initial public release. |
2 | 2022-07-28 | Disclosed vulnerability details. |