Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8vr7-33jp-gfgw

Опубликовано: 19 дек. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 5.4

Описание

A heap-based buffer overflow vulnerability in the processing of Link Control Protocol messages in FortiGate versions 5.6.12, 6.0.10, 6.2.4 and 6.4.1 and earlier may allow a remote attacker with valid SSL VPN credentials to crash the SSL VPN daemon by sending a large LCP packet, when tunnel mode is enabled. Arbitrary code execution may be theoretically possible, albeit practically very difficult to achieve in this context

A heap-based buffer overflow vulnerability in the processing of Link Control Protocol messages in FortiGate versions 5.6.12, 6.0.10, 6.2.4 and 6.4.1 and earlier may allow a remote attacker with valid SSL VPN credentials to crash the SSL VPN daemon by sending a large LCP packet, when tunnel mode is enabled. Arbitrary code execution may be theoretically possible, albeit practically very difficult to achieve in this context

EPSS

Процентиль: 79%
0.01292
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-122
CWE-787

Связанные уязвимости

CVSS3: 5.4
nvd
около 1 года назад

A heap-based buffer overflow vulnerability in the processing of Link Control Protocol messages in FortiGate versions 5.6.12, 6.0.10, 6.2.4 and 6.4.1 and earlier may allow a remote attacker with valid SSL VPN credentials to crash the SSL VPN daemon by sending a large LCP packet, when tunnel mode is enabled. Arbitrary code execution may be theoretically possible, albeit practically very difficult to achieve in this context

CVSS3: 8.8
fstec
больше 5 лет назад

Уязвимость режима Tunnel Mode реализации технологии SSL VPN операционных систем FortiOS, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 79%
0.01292
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-122
CWE-787