A stack buffer overflow vulnerability in FortiClient for Linux 6.2.1 and below may allow a user with low privilege to cause FortiClient processes running under root priviledge crashes via sending specially crafted "StartAvCustomScan" type IPC client requests to the fctsched process due the argv data not been well sanitized.
Metrics
Affected Vendors & Products
References
History
Fri, 25 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: fortinet
Published: 2020-02-06T15:23:33
Updated: 2024-10-25T14:03:49.458Z
Reserved: 2019-10-16T00:00:00
Link: CVE-2019-17652
Vulnrichment
Updated: 2024-08-05T01:47:13.604Z
NVD
Status : Analyzed
Published: 2020-02-06T16:15:12.353
Modified: 2020-02-12T18:36:51.193
Link: CVE-2019-17652
Redhat
No data.