Multiple buffer copy without checking size of input ('classic buffer overflow') vulnerabilities [CWE-120] in FortiADC version 7.2.0 and before 7.1.2 & FortiDDoS-F version 6.5.0 and before 6.4.1 allows a privileged attacker to execute arbitrary code or commands via specifically crafted CLI requests.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-32778 | Multiple buffer copy without checking size of input ('classic buffer overflow') vulnerabilities [CWE-120] in FortiADC version 7.2.0 and before 7.1.2 & FortiDDoS-F version 6.5.0 and before 6.4.1 allows a privileged attacker to execute arbitrary code or commands via specifically crafted CLI requests. |
Fixes
Solution
Please upgrade to FortiDDoS-F version 6.5.1 or above Please upgrade to FortiDDoS-F version 6.4.2 or above Please upgrade to FortiADC version 7.2.1 or above Please upgrade to FortiADC version 7.1.3 or above
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-23-064 |
|
History
No history.
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-30T18:09:33.400Z
Reserved: 2023-04-03T08:47:30.452Z
Link: CVE-2023-29177
Updated: 2024-08-02T14:00:15.976Z
Status : Modified
Published: 2023-11-14T19:15:24.337
Modified: 2024-11-21T07:56:39.793
Link: CVE-2023-29177
No data.
OpenCVE Enrichment
No data.
EUVD