What are you looking for ?
Advertise with us
RAIDON

Synology Security Advisory 23:02 Sudo

Vulnerability allows local users to conduct privilege escalation attacks via susceptible version of DSM and SRM.

Synology, Inc. had published a security advisory concerning a vulnerability in DiskStation Manager (DSM) NAS OS and Synology Router Manager (SRM).

Publish time: 2023-03-30 16:17:07 UTC+8
Last updated: 2023-10-04 18:16:36 UTC+8
Severity: Low
Status: Accepted

Abstract
A vulnerability allows local users to conduct privilege escalation attacks via a susceptible version of DSM and SRM.

Affected products

Product

Severity

Fixed release availability

DSM 7.1

Low

Upgrade to 7.2.1-69057 or above

DSM 7.0

Low

Will not fix

DSM 6.2

Low

Will not fix

DSMUC 3.1

Low

Will not fix

SRM 1.3

Low

Will not fix

SRM 1.2

Not affected

N/A

VS Firmware 3.0

Low

Will not fix

Mitigation : None

Detail

  • CVE-2023-22809

    • Severity: Low

    • CVSS3 Base Score: 6.7

    • CVSS3 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

    • In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a “–” argument that defeats a protection mechanism, e.g., an EDITOR=’vim — /path/to/extra/file’ value.

Reference

CVE-2023-22809

Revision

Revision

Date

Description

1

2023-03-30

Initial public release

2

2023-09-26

Update for DSM 7.1 is now available in affected products

 

Articles_bottom
ExaGrid
AIC
ATTOtarget="_blank"
OPEN-E