Multiple buffer copy without checking size of input ('classic buffer overflow') vulnerabilities [CWE-120] in FortiADC version 7.2.0 and before 7.1.2 & FortiDDoS-F version 6.5.0 and before 6.4.1 allows a privileged attacker to execute arbitrary code or commands via specifically crafted CLI requests.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-32778 | Multiple buffer copy without checking size of input ('classic buffer overflow') vulnerabilities [CWE-120] in FortiADC version 7.2.0 and before 7.1.2 & FortiDDoS-F version 6.5.0 and before 6.4.1 allows a privileged attacker to execute arbitrary code or commands via specifically crafted CLI requests. |
Fixes
Solution
Please upgrade to FortiDDoS-F version 6.5.1 or above Please upgrade to FortiDDoS-F version 6.4.2 or above Please upgrade to FortiADC version 7.2.1 or above Please upgrade to FortiADC version 7.1.3 or above
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-23-064 |
![]() ![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-30T18:09:33.400Z
Reserved: 2023-04-03T08:47:30.452Z
Link: CVE-2023-29177

Updated: 2024-08-02T14:00:15.976Z

Status : Modified
Published: 2023-11-14T19:15:24.337
Modified: 2024-11-21T07:56:39.793
Link: CVE-2023-29177

No data.

No data.