A access of uninitialized pointer vulnerability [CWE-824] in Fortinet FortiProxy version 7.2.0 through 7.2.3 and before 7.0.9 and FortiOS version 7.2.0 through 7.2.4 and before 7.0.11 allows an authenticated attacker to repetitively crash the httpsd process via crafted HTTP or HTTPS requests.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-32779 A access of uninitialized pointer vulnerability [CWE-824] in Fortinet FortiProxy version 7.2.0 through 7.2.3 and before 7.0.9 and FortiOS version 7.2.0 through 7.2.4 and before 7.0.11 allows an authenticated attacker to repetitively crash the httpsd process via crafted HTTP or HTTPS requests.
Fixes

Solution

Please upgrade to FortiProxy version 7.2.4 or above Please upgrade to FortiProxy version 7.0.10 or above Please upgrade to FortiOS version 7.2.5 or above Please upgrade to FortiOS version 7.0.12 or above


Workaround

No workaround given by the vendor.

References
History

Tue, 22 Oct 2024 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2024-10-22T20:45:18.608Z

Reserved: 2023-04-03T08:47:30.452Z

Link: CVE-2023-29178

cve-icon Vulnrichment

Updated: 2024-08-02T14:00:15.896Z

cve-icon NVD

Status : Modified

Published: 2023-06-13T09:15:17.077

Modified: 2024-11-21T07:56:39.910

Link: CVE-2023-29178

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.