First published: Sat May 30 2015(Updated: )
client_chown in the sync client in Synology Cloud Station 1.1-2291 through 3.1-3320 on OS X allows local users to change the ownership of arbitrary files, and consequently obtain root access, by specifying a filename.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Synology Cloud Station | =1.1-2291 | |
Synology Cloud Station | =2.0-2291 | |
Synology Cloud Station | =2.0-2402 | |
Synology Cloud Station | =2.1-2561 | |
Synology Cloud Station | =2.1-2570 | |
Synology Cloud Station | =2.1-2577 | |
Synology Cloud Station | =3.0-3005 | |
Synology Cloud Station | =3.0-3103 | |
Synology Cloud Station | =3.0-3108 | |
Synology Cloud Station | =3.0-3109 | |
Synology Cloud Station | =3.0-3111 | |
Synology Cloud Station | =3.1-3317 | |
Synology Cloud Station | =3.1-3320 | |
Apple iOS and macOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2851 is considered a high severity vulnerability due to its potential to allow local users to gain root access.
To fix CVE-2015-2851, upgrade to a later version of Synology Cloud Station that addresses this vulnerability.
CVE-2015-2851 affects users of Synology Cloud Station versions 1.1-2291 through 3.1-3320 on OS X.
CVE-2015-2851 allows a local user to change the ownership of arbitrary files, which can lead to unauthorized access and control over the system.
CVE-2015-2851 cannot be exploited remotely as it requires local user access to the system.