These newly-released updates resolve CVE-2014-3567 and CVE-2014-3568 OpenSSL programming vulnerabilities

Jan 15, 2015 13:39 GMT  ·  By

Buffalo has just rolled out two new firmware packages developed for its TS3000 and LS200 series NAS devices, namely version 1.16 and 1.62, respectively, which add support for Mac OS X 10.10 and fix some vulnerabilities.

To be clear about the compatible products, the present update can be applied on TS3400R, TS3400D, and TS3200D NASes included in Buffalo’s TS3000 line-up, as well as on LS210D, LS220D, LS220DB, and LS220DE units that form the producer’s LS200 Series.

As for the changes, both firmware versions resolve CVE-2014-3567 and CVE-2014-3568 OpenSSL programming vulnerabilities (a.k.a. POODLE SSL 3.0 vulnerability).

When it comes to the 1.62 update alone, this software has been slightly modified to be able to deal with the CVE-2014-5139 OpenSSL programming vulnerability that causes a NULL pointer dereference, as well as to fix an issue regarding the Settings interface.

In addition to that, Buffalo has also managed to remove CVE-2014-0244 and CVE-2014-3498 Samba security vulnerabilities, which would have blocked the service because of a loop encountered by the CPU (the utilization therefore goes up to 100%).

If you intend to apply these versions, you must save the appropriate package that will help upgrading your NAS.

Buffalo has provided two downloadable archives: one suitable for Mac OS X 10.6 and later platforms, and the other compatible with Windows XP, Vista, 7, 8, and 8.1 operating systems, as well as Server 2003, 2008, and 2012 OSes.

That being said, download Buffalo TS3000 NAS Series Firmware 1.16 or download Buffalo LS200 NAS Series Firmware 1.62, carefully apply it on your network storage, and constantly check our website to be aware when a newer version is available.

Buffalo TeraStation 3000 and LinkStation 200 Series (15 Images)

Buffalo LinkStation 220 NAS
Buffalo LinkStation 220 Front ViewBuffalo LinkStation 220 Back Ports
+12more