A stack buffer overflow vulnerability in FortiClient for Linux 6.2.1 and below may allow a user with low privilege to cause FortiClient processes running under root priviledge crashes via sending specially crafted "StartAvCustomScan" type IPC client requests to the fctsched process due the argv data not been well sanitized.
History

Fri, 25 Oct 2024 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published: 2020-02-06T15:23:33

Updated: 2024-10-25T14:03:49.458Z

Reserved: 2019-10-16T00:00:00

Link: CVE-2019-17652

cve-icon Vulnrichment

Updated: 2024-08-05T01:47:13.604Z

cve-icon NVD

Status : Analyzed

Published: 2020-02-06T16:15:12.353

Modified: 2020-02-12T18:36:51.193

Link: CVE-2019-17652

cve-icon Redhat

No data.