cve-2017-13067
Vulnerability from cvelistv5
Published
2017-09-14 15:00
Modified
2024-09-17 02:47
Severity ?
EPSS score ?
Summary
QNAP has patched a remote code execution vulnerability affecting the QTS Media Library in all versions prior to QTS 4.2.6 build 20170905 and QTS 4.3.3.0299 build 20170901. This particular vulnerability allows a remote attacker to execute commands on a QNAP NAS using a transcoding service on port 9251. A remote user does not require any privileges to successfully execute an attack.
References
▼ | URL | Tags | |
---|---|---|---|
security@qnapsecurity.com.tw | https://www.qnap.com/zh-hk/releasenotes/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.qnap.com/zh-hk/releasenotes/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | QNAP | QTS Media Libary PRODUCT |
Version: prior to 4.2.6 build 20170905 Version: prior to 4.3.3.0299 build 20170901 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:58:12.330Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.qnap.com/zh-hk/releasenotes/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "QTS Media Libary PRODUCT", "vendor": "QNAP", "versions": [ { "status": "affected", "version": "prior to 4.2.6 build 20170905" }, { "status": "affected", "version": "prior to 4.3.3.0299 build 20170901" } ] } ], "datePublic": "2017-09-01T00:00:00", "descriptions": [ { "lang": "en", "value": "QNAP has patched a remote code execution vulnerability affecting the QTS Media Library in all versions prior to QTS 4.2.6 build 20170905 and QTS 4.3.3.0299 build 20170901. This particular vulnerability allows a remote attacker to execute commands on a QNAP NAS using a transcoding service on port 9251. A remote user does not require any privileges to successfully execute an attack." } ], "problemTypes": [ { "descriptions": [ { "description": "remote code execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-14T14:57:01", "orgId": "2fd009eb-170a-4625-932b-17a53af1051f", "shortName": "qnap" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.qnap.com/zh-hk/releasenotes/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@qnap.com", "DATE_PUBLIC": "2017-09-01T00:00:00", "ID": "CVE-2017-13067", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "QTS Media Libary PRODUCT", "version": { "version_data": [ { "version_value": "prior to 4.2.6 build 20170905" }, { "version_value": "prior to 4.3.3.0299 build 20170901" } ] } } ] }, "vendor_name": "QNAP" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "QNAP has patched a remote code execution vulnerability affecting the QTS Media Library in all versions prior to QTS 4.2.6 build 20170905 and QTS 4.3.3.0299 build 20170901. This particular vulnerability allows a remote attacker to execute commands on a QNAP NAS using a transcoding service on port 9251. A remote user does not require any privileges to successfully execute an attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "remote code execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.qnap.com/zh-hk/releasenotes/", "refsource": "CONFIRM", "url": "https://www.qnap.com/zh-hk/releasenotes/" } ] } } } }, "cveMetadata": { "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f", "assignerShortName": "qnap", "cveId": "CVE-2017-13067", "datePublished": "2017-09-14T15:00:00Z", "dateReserved": "2017-08-22T00:00:00", "dateUpdated": "2024-09-17T02:47:14.046Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.2.0\", \"versionEndIncluding\": \"4.2.6\", \"matchCriteriaId\": \"F061D299-AF11-413B-96D8-977D8F7BA2A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.3.0\", \"versionEndIncluding\": \"4.3.3.0299\", \"matchCriteriaId\": \"B43F1A92-B74F-4F95-8C6C-12552F115922\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"QNAP has patched a remote code execution vulnerability affecting the QTS Media Library in all versions prior to QTS 4.2.6 build 20170905 and QTS 4.3.3.0299 build 20170901. This particular vulnerability allows a remote attacker to execute commands on a QNAP NAS using a transcoding service on port 9251. A remote user does not require any privileges to successfully execute an attack.\"}, {\"lang\": \"es\", \"value\": \"QNAP ha parcheado una vulnerabilidad de ejecuci\\u00f3n remota de c\\u00f3digo que afecta a la biblioteca multimedia de QTS en todas sus versiones anteriores a la QTS 4.2.6 build 20170905 y QTS 4.3.3.0299 build 20170901. Esta vulnerabilidad permite que un atacante remoto ejecute comandos en un NAS de QNAP utilizando un servicio de transcodificaci\\u00f3n en el puerto 9251. No es necesario que un usuario remoto tenga privilegios para llevar a cabo un ataque con \\u00e9xito.\"}]", "id": "CVE-2017-13067", "lastModified": "2024-11-21T03:10:53.383", "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2017-09-14T15:29:00.263", "references": "[{\"url\": \"https://www.qnap.com/zh-hk/releasenotes/\", \"source\": \"security@qnapsecurity.com.tw\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.qnap.com/zh-hk/releasenotes/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "security@qnapsecurity.com.tw", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2017-13067\",\"sourceIdentifier\":\"security@qnapsecurity.com.tw\",\"published\":\"2017-09-14T15:29:00.263\",\"lastModified\":\"2024-11-21T03:10:53.383\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"QNAP has patched a remote code execution vulnerability affecting the QTS Media Library in all versions prior to QTS 4.2.6 build 20170905 and QTS 4.3.3.0299 build 20170901. This particular vulnerability allows a remote attacker to execute commands on a QNAP NAS using a transcoding service on port 9251. A remote user does not require any privileges to successfully execute an attack.\"},{\"lang\":\"es\",\"value\":\"QNAP ha parcheado una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo que afecta a la biblioteca multimedia de QTS en todas sus versiones anteriores a la QTS 4.2.6 build 20170905 y QTS 4.3.3.0299 build 20170901. Esta vulnerabilidad permite que un atacante remoto ejecute comandos en un NAS de QNAP utilizando un servicio de transcodificaci\u00f3n en el puerto 9251. No es necesario que un usuario remoto tenga privilegios para llevar a cabo un ataque con \u00e9xito.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.2.0\",\"versionEndIncluding\":\"4.2.6\",\"matchCriteriaId\":\"F061D299-AF11-413B-96D8-977D8F7BA2A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.3.0\",\"versionEndIncluding\":\"4.3.3.0299\",\"matchCriteriaId\":\"B43F1A92-B74F-4F95-8C6C-12552F115922\"}]}]}],\"references\":[{\"url\":\"https://www.qnap.com/zh-hk/releasenotes/\",\"source\":\"security@qnapsecurity.com.tw\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.qnap.com/zh-hk/releasenotes/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.