First published: Thu Aug 31 2017(Updated: )
Multiple untrusted search path vulnerabilities in the installer in Synology Cloud Station Drive before 4.2.5-4396 on Windows allow local attackers to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) shfolder.dll, (2) ntmarta.dll, (3) secur32.dll or (4) dwmapi.dll file in the current working directory.
Credit: security@synology.com
Affected Software | Affected Version | How to fix |
---|---|---|
Synology Cloud Station Drive | <=4.2.4-4393 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11158 is classified as a high-severity vulnerability due to its potential for local attackers to execute arbitrary code.
To fix CVE-2017-11158, users should upgrade Synology Cloud Station Drive to version 4.2.5-4396 or later.
CVE-2017-11158 allows local attackers to conduct DLL hijacking attacks and execute arbitrary code.
Versions of Synology Cloud Station Drive prior to 4.2.5-4396 are affected by CVE-2017-11158.
CVE-2017-11158 involves multiple untrusted search path vulnerabilities related to shfolder.dll, ntmarta.dll, secur32.dll, and dwmapi.dll.