Interpretation conflict in Fortinet FortiGate 2.8, running FortiOS 2.8MR10 and v3beta, allows remote attackers to bypass the URL blocker via an (1) HTTP request terminated with a line feed (LF) and not carriage return line feed (CRLF) or (2) HTTP request with no Host field, which is still processed by most web servers without violating RFC2616.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2006-02-14T19:00:00
Updated: 2024-08-07T22:53:30.384Z
Reserved: 2005-09-26T00:00:00
Link: CVE-2005-3058
Vulnrichment
No data.
NVD
Status : Modified
Published: 2005-12-31T05:00:00.000
Modified: 2024-11-21T00:01:01.887
Link: CVE-2005-3058
Redhat
No data.