CVE-2023-5748

Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in cgi component in Synology SSL VPN Client before 1.4.7-0687 allows local users to conduct denial-of-service attacks via unspecified vectors.
Configurations

Configuration 1 (hide)

cpe:2.3:a:synology:ssl_vpn_client:*:*:*:*:*:*:*:*

History

14 Nov 2023, 18:41

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-120
CPE cpe:2.3:a:synology:ssl_vpn_client:*:*:*:*:*:*:*:*
First Time Synology
Synology ssl Vpn Client
References () https://www.synology.com/en-global/security/advisory/Synology_SA_23_12 - () https://www.synology.com/en-global/security/advisory/Synology_SA_23_12 - Vendor Advisory

07 Nov 2023, 12:14

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-07 04:24

Updated : 2023-12-10 15:14


NVD link : CVE-2023-5748

Mitre link : CVE-2023-5748

CVE.ORG link : CVE-2023-5748


JSON object : View

Products Affected

synology

  • ssl_vpn_client
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')