CVE-2021-3156 - Heap-Based Buffer Overflow in Sudo (Baron Samedit)


最后修订日期: 2021-02-04
  • Release date: January 28, 2021
  • Security ID: QSA-21-02
  • Severity: Medium
  • CVE identifier: CVE-2021-3156
  • Affected products: All QNAP NAS
  • Status: Investigating

Summary

The Qualys research team has reported a heap-based buffer overflow vulnerability in sudo, an important utility for Unix-like and Linux-based operating systems, including QTS, QuTS hero, and QES from QNAP. 

If exploited, this vulnerability allows any unprivileged users to gain escalated root privileges on the vulnerable host.  

QNAP is thoroughly investigating the case. We will release security updates and provide further information as soon as possible.

Recommendation

To secure your device, we recommend disabling SSH and Telnet whenever you are not using these services.

Disabling SSH and Telnet Connections in QTS or QuTS hero

  1. Log on to QTS or QuTS hero as administrator.
  2. Go to Control Panel > Network & File Services > Telnet/SSH.
  3. Deselect Allow Telnet connection.
  4. Deselect Allow SSH connection.
  5. Click Apply.

Disabling SSH Connections in QES

  1. Log on to QES as administrator.
  2. Go to Control Panel > Network & File Services > SSH.
  3. Deselect Allow SSH connection.
  4. Click Apply.

Revision History: V1.0 (January 28, 2021) - Published

https://www.qnap.com/en/security-advisory/qsa-21-02

这篇文章有帮助吗?

谢谢您,我们已经收到您的意见。

请告诉我们如何改进这篇文章:

如果您想提供其他意见,请于下方输入。

选择规格

      显示更多 隐藏更多
      open menu
      back to top