Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j454-8m43-mvvq

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A stack buffer overflow vulnerability in FortiClient for Linux 6.2.1 and below may allow a user with low privilege to cause FortiClient processes running under root priviledge crashes via sending specially crafted "StartAvCustomScan" type IPC client requests to the fctsched process due the argv data not been well sanitized.

A stack buffer overflow vulnerability in FortiClient for Linux 6.2.1 and below may allow a user with low privilege to cause FortiClient processes running under root priviledge crashes via sending specially crafted "StartAvCustomScan" type IPC client requests to the fctsched process due the argv data not been well sanitized.

EPSS

Процентиль: 62%
0.00425
Низкий

Связанные уязвимости

CVSS3: 6.5
nvd
около 6 лет назад

A stack buffer overflow vulnerability in FortiClient for Linux 6.2.1 and below may allow a user with low privilege to cause FortiClient processes running under root priviledge crashes via sending specially crafted "StartAvCustomScan" type IPC client requests to the fctsched process due the argv data not been well sanitized.

CVSS3: 6.5
fstec
около 6 лет назад

Уязвимость библиотеки сокетов nanomsg средства защиты Fortinet FortiClient for Linux, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 62%
0.00425
Низкий