[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] Re: CVE request: QNAP QTS
From:       cve-assign () mitre ! org
Date:       2014-09-29 17:57:03
Message-ID: 20140929175703.5DD5572E0FE () smtpvbsrv1 ! mitre ! org
[Download RAW message or body]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> QNAP QTS employ Bash as the default shell and we discover an arbitrary
> code execution flaw with UID=0

As far as we can tell, the
http://www.qnap.com/useng/index.php?lang=en-us&sn=885&c=3036&sc=&n=22457
reference suggests that the code execution for that PoC occurs because
the QNAP Bash build has the CVE-2014-6271 vulnerability. In that case,
the applicable CVE ID is CVE-2014-6271, not a separate CVE ID specific
to QNAP's build.

If you mean something else -- for example, if another reference states
that the implementation language of restore_config.cgi is not sh and
that the design of restore_config.cgi was supposed to drop privileges
immediately, but there's an implementation flaw in which Bash is
launched before privileges are dropped -- then there could conceivably
be a separate CVE ID for that restore_config.cgi issue. Similarly, if
you're referring to an authentication bypass -- for example, if the
implementation language of restore_config.cgi is not sh and the design
of restore_config.cgi was supposed to exit immediately for
unauthenticated requests, but there's an implementation flaw in which
Bash is launched before missing authentication is detected, then there
could conceivably be a separate CVE ID.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUKZzGAAoJEKllVAevmvmsYVkIAL4Y1FNV4YcHY8r2jIHfg1Ez
zLtThhTE6s3CMPfmDJPnjCm9uwTNvT9QLSJ9v6eZhoaXvutCqdKNqjfcdabZhikr
7JRHJcg4jTOcrang/w9+9SL8dJ3C/JUFfJZyUKfA2d19vCCuXwpnOZKq/70C2Pl1
tU8U1VONrZCuSImAIWpy/aoFtc5GeSGxkblb6StMteZIXbDM+PsAyrtY0yRX9UuG
VIpeX0aVVH6XW8+1L1jVYolYDdN3M8pZWBJYArFxgg+A/vSu7Vk5ZsGO/vY8y7jv
x1h76ah6I7cw3GSUt9fujizBEi+ekAWaGXqB6pOG3/HUO1xI9BJofuDQSg+ZtIE=
=kin/
-----END PGP SIGNATURE-----
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic