Описание
The Fortishield.sys driver in Fortinet FortiClient before 5.2.4 allows local users to execute arbitrary code with kernel privileges by setting the callback function in a (1) 0x220024 or (2) 0x220028 ioctl call.
The Fortishield.sys driver in Fortinet FortiClient before 5.2.4 allows local users to execute arbitrary code with kernel privileges by setting the callback function in a (1) 0x220024 or (2) 0x220028 ioctl call.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2015-5736
- https://www.exploit-db.com/exploits/41721
- https://www.exploit-db.com/exploits/41722
- https://www.exploit-db.com/exploits/45149
- http://fortiguard.com/advisory/mulitple-vulnerabilities-in-forticlient
- http://packetstormsecurity.com/files/133398/FortiClient-Antivirus-Information-Exposure-Access-Control.html
- http://seclists.org/fulldisclosure/2015/Sep/0
- http://www.coresecurity.com/advisories/forticlient-antivirus-multiple-vulnerabilities
- http://www.fortiguard.com/advisory/mulitple-vulnerabilities-in-forticlient
- http://www.securityfocus.com/archive/1/536369/100/0/threaded
- http://www.securitytracker.com/id/1033439
EPSS
Процентиль: 82%
0.01778
Низкий
CVE ID
Связанные уязвимости
nvd
больше 10 лет назад
The Fortishield.sys driver in Fortinet FortiClient before 5.2.4 allows local users to execute arbitrary code with kernel privileges by setting the callback function in a (1) 0x220024 or (2) 0x220028 ioctl call.
EPSS
Процентиль: 82%
0.01778
Низкий