安全ID : QSA-21-02
Heap-Based Buffer Overflow in Sudo (Baron Samedit)
发布日期 : January 28, 2021
通用漏洞披露 : CVE-2021-3156
受影响产品: All QNAP NAS
严重程度
Moderate
状态
已解决
Summary
The Qualys research team has reported a heap-based buffer overflow vulnerability in sudo, an important utility for Unix-like and Linux-based operating systems, including QTS, QuTS hero, and QES from QNAP.
If exploited, this vulnerability allows any unprivileged users to gain escalated root privileges on the vulnerable host.
QNAP is thoroughly investigating the case. We will release security updates and provide further information as soon as possible.
We have already fixed this vulnerability in the following versions:
- QTS 4.5.2.1566 Build 20210202 and later
- QuTS hero h4.5.1.1582 build 20210217 and later
Recommendation
For QTS or QuTS hero, we strongly recommend updating your system to the latest version to benefit from vulnerability fixes. You can check the product support status to see the latest updates available to your NAS model.
For QES, To secure your device, we recommend disabling SSH and Telnet whenever you are not using these services.
Disabling SSH and Telnet Connections in QTS or QuTS hero
- Log on to QTS or QuTS hero as administrator.
- Go to Control Panel > Network & File Services > Telnet/SSH.
- Deselect Allow Telnet connection.
- Deselect Allow SSH connection.
- Click Apply.
Disabling SSH Connections in QES
- Log on to QES as administrator.
- Go to Control Panel > Network & File Services > SSH.
- Deselect Allow SSH connection.
- Click Apply.
Updating QTS or QuTS hero
- Log on to QTS or QuTS hero as administrator.
- Go to Control Panel > System > Firmware Update.
- Under Live Update, click Check for Update.
QTS or QuTS hero downloads and installs the latest available update.
Tip: You can also download the update from the QNAP website. Go to Support > Download Center and then perform a manual update for your specific device.
修订历史:
V2.0 (April 12, 2021) - Publish for solutions of QTS
V1.0 (January 28, 2021) - Published