Heap buffer overflow in sslvpn pre-authentication
Summary
A heap-based buffer overflow vulnerability [CWE-122] in FortiOS and FortiProxy SSL-VPN may allow a remote attacker to execute arbitrary code or commands via specifically crafted requests.
Workaround:
Disable SSL-VPN.
| Version | Affected | Solution |
|---|---|---|
| FortiOS 7.4 | Not affected | Not Applicable |
| FortiOS 7.2 | 7.2.0 through 7.2.4 | Upgrade to 7.2.5 or above |
| FortiOS 7.0 | 7.0.0 through 7.0.11 | Upgrade to 7.0.12 or above |
| FortiOS 6.4 | 6.4.0 through 6.4.12 | Upgrade to 6.4.13 or above |
| FortiOS 6.2 | 6.2.0 through 6.2.13 | Upgrade to 6.2.14 or above |
| FortiOS 6.0 | 6.0.0 through 6.0.16 | Upgrade to 6.0.17 or above |
| FortiOS-6K7K 7.0 | 7.0.10 | Upgrade to 7.0.12 or above |
| FortiOS-6K7K 7.0 | 7.0.5 | Upgrade to 7.0.12 or above |
| FortiOS-6K7K 6.4 | 6.4.12 | Upgrade to 6.4.13 or above |
| FortiOS-6K7K 6.4 | 6.4.10 | Upgrade to 6.4.13 or above |
| FortiOS-6K7K 6.4 | 6.4.8 | Upgrade to 6.4.13 or above |
| FortiOS-6K7K 6.4 | 6.4.6 | Upgrade to 6.4.13 or above |
| FortiOS-6K7K 6.4 | 6.4.2 | Upgrade to 6.4.13 or above |
| FortiOS-6K7K 6.2 | 6.2.9 through 6.2.13 | Upgrade to 6.2.15 or above |
| FortiOS-6K7K 6.2 | 6.2.6 through 6.2.7 | Upgrade to 6.2.15 or above |
| FortiOS-6K7K 6.2 | 6.2.4 | Upgrade to 6.2.15 or above |
| FortiOS-6K7K 6.0 | 6.0.12 through 6.0.16 | Upgrade to 6.0.17 or above |
| FortiOS-6K7K 6.0 | 6.0.10 | Upgrade to 6.0.17 or above |
| FortiProxy 7.2 | 7.2.0 through 7.2.3 | Upgrade to 7.2.4 or above |
| FortiProxy 7.0 | 7.0.0 through 7.0.9 | Upgrade to 7.0.10 or above |
| FortiProxy 2.0 | 2.0.0 through 2.0.12 | Upgrade to 2.0.13 or above |
| FortiProxy 1.2 | 1.2 all versions | Migrate to a fixed release |
| FortiProxy 1.1 | 1.1 all versions | Migrate to a fixed release |