Lucene search

K
cve[email protected]CVE-2023-5748
HistoryNov 07, 2023 - 4:24 a.m.

CVE-2023-5748

2023-11-0704:24:19
CWE-120
web.nvd.nist.gov
12
cve-2023-5748
buffer overflow
synology
ssl vpn client
nvd

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

5.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Buffer copy without checking size of input (‘Classic Buffer Overflow’) vulnerability in cgi component in Synology SSL VPN Client before 1.4.7-0687 allows local users to conduct denial-of-service attacks via unspecified vectors.

Affected configurations

NVD
Node
synologyssl_vpn_clientRange<1.4.7-0687

CNA Affected

[
  {
    "vendor": "Synology",
    "product": "Synology SSL VPN Client",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThan": "1.4.7-0687",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "affected"
  }
]

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

5.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Related for CVE-2023-5748