Description
A stack-based buffer overflow vulnerability [CWE-121] in the CA sign functionality of FortiWeb version 7.0.1 and below, 6.4 all versions, version 6.3.19 and below may allow an authenticated attacker to achieve arbitrary code execution via specifically crafted password.
No analysis available yet.
Remediation
Vendor Solution
Please upgrade to FortiWeb version 7.0.2 or above Please upgrade to FortiWeb version 6.3.20 or above
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-52257 | A stack-based buffer overflow vulnerability [CWE-121] in the CA sign functionality of FortiWeb version 7.0.1 and below, 6.4 all versions, version 6.3.19 and below may allow an authenticated attacker to achieve arbitrary code execution via specifically crafted password. |
References
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-22-167 |
|
History
Wed, 23 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-23T14:47:11.505Z
Reserved: 2022-05-06T12:09:27.625Z
Link: CVE-2022-30306
Updated: 2024-08-03T06:48:35.812Z
Status : Modified
Published: 2023-02-16T19:15:12.597
Modified: 2024-11-21T07:02:32.473
Link: CVE-2022-30306
No data.
OpenCVE Enrichment
No data.
EUVD