{"id":3533,"date":"2022-03-15T14:01:03","date_gmt":"2022-03-15T13:01:03","guid":{"rendered":"https:\/\/sajberinfo.com\/2022\/11\/21\/text-74\/"},"modified":"2022-12-04T12:49:41","modified_gmt":"2022-12-04T11:49:41","slug":"dirty-pipe-ranjivost-pogadja-vecinu-qnap-uredjaja","status":"publish","type":"post","link":"https:\/\/sajberinfo.com\/en\/2022\/03\/15\/dirty-pipe-ranjivost-pogadja-vecinu-qnap-uredjaja\/","title":{"rendered":"Dirty Pipe ranjivost poga\u0111a ve\u0107inu QNAP ure\u0111aja"},"content":{"rendered":"<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Proizvo\u0111a\u010d <em>NAS<\/em> ure\u0111aja, kompanija <em>QNAP<\/em>, upozorava korisnike da je velika ve\u0107ina njihovih ure\u0111aja pogo\u0111ena <a href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/15\/velika-sigurnosna-linux-ranjivost\/\" target=\"_blank\" rel=\"noopener\">ranjivo\u0161\u0107u <em>Dirty Pipe<\/em><\/a> koja omogu\u0107ava napada\u010du da dobije <em>root<\/em> privilegije na ure\u0111aju.<\/span><\/span><\/p>\n<div id=\"attachment_3819\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3819\" class=\"size-full wp-image-3819\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/qnap-security-gcd812d07f_1920.jpg\" alt=\"QNAP Network Attached Storage Alert\" width=\"1024\" height=\"609\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/qnap-security-gcd812d07f_1920.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/qnap-security-gcd812d07f_1920-300x178.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/qnap-security-gcd812d07f_1920-768x457.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/qnap-security-gcd812d07f_1920-18x12.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-3819\" class=\"wp-caption-text\"><em>QNAP NAS<\/em> upozorenje; Source:<a href=\"https:\/\/pixabay.com\/images\/id-5043368\/\" target=\"_blank\" rel=\"noopener\"><em>Pixabay<\/em><\/a> &#8211; Edit by Sa\u0161a \u0110uri\u0107<\/p><\/div>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Iako su ispravke za verzije <em>Linux<\/em> jezgra 5.16.11, 5.15.25 i 5.10.102 dostupne ve\u0107 od pro\u0161le sedmice, kompanija <em>QNAP<\/em> ka\u017ee da \u0107e njeni korisnici morati sa\u010dekati dok kompanija ne pripremi svoje sigurnosno a\u017euriranje za pogo\u0111ene ure\u0111aje. U slu\u010daju <em>QNAP NAS<\/em> ure\u0111aja, <a href=\"https:\/\/www.qnap.com\/en-us\/security-advisory\/qsa-22-05\" target=\"_blank\" rel=\"noopener\">ova ranjivost omogu\u0107ava napada\u010du<\/a> da dobije administratorski pristup ure\u0111aju i nakon toga mo\u017ee da ga zarazi zlonamjernim softverom. Listu ure\u0111aja pogo\u0111enih ovom ranjivo\u0161\u0107u mo\u017eete pogledati <a href=\"https:\/\/www.qnap.com\/en-us\/release-notes\/kernel\" target=\"_blank\" rel=\"noopener\">ovdje<\/a>.<\/span><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">\u00a0<\/span><\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"> Kompanija <em>QNAP<\/em> za sada preporu\u010duje da se onemogu\u0107i <em>Port Forwarding, UpnP, SSH<\/em> i <em>Telnet<\/em> opcije na ure\u0111aju. Detaljnije na stranici proizvo\u0111a\u010da <a href=\"https:\/\/www.qnap.com\/en\/security-advisory\/nas-201911-01\" target=\"_blank\" rel=\"noopener\">ovdje<\/a>.<\/span><\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Proizvo\u0111a\u010d NAS ure\u0111aja, kompanija QNAP, upozorava korisnike da je velika ve\u0107ina njihovih ure\u0111aja pogo\u0111ena ranjivo\u0161\u0107u Dirty Pipe koja omogu\u0107ava napada\u010du da dobije root privilegije na ure\u0111aju. Iako su ispravke za verzije Linux jezgra 5.16.11,&#46;&#46;&#46;<\/p>","protected":false},"author":1,"featured_media":3819,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[142,178,141,93,131,132,65,64,126],"class_list":["post-3533","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hronike","tag-backdoor","tag-hacker","tag-linux","tag-malware","tag-nas","tag-qnap","tag-rezervna-kopija","tag-sajber-prijetnja","tag-vulnerability"],"_links":{"self":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/3533","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/comments?post=3533"}],"version-history":[{"count":0,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/3533\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media\/3819"}],"wp:attachment":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media?parent=3533"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/categories?post=3533"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/tags?post=3533"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}