Format string vulnerability in Fortinet FortiClient 3.0.614, and possibly earlier, allows local users to execute arbitrary code via format string specifiers in the VPN connection name.
References
Configurations
History
21 Nov 2024, 01:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.grok.org.uk/pipermail/full-disclosure/2009-April/068583.html - | |
References | () http://osvdb.org/53266 - | |
References | () http://secunia.com/advisories/34524 - Vendor Advisory | |
References | () http://www.layereddefense.com/FortiClient02Apr.html - | |
References | () http://www.securityfocus.com/archive/1/502354/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/502602/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/34343 - | |
References | () http://www.securitytracker.com/id?1021966 - | |
References | () http://www.vupen.com/english/advisories/2009/0941 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/49633 - |
Information
Published : 2009-04-07 23:30
Updated : 2024-11-21 01:02
NVD link : CVE-2009-1262
Mitre link : CVE-2009-1262
CVE.ORG link : CVE-2009-1262
JSON object : View
Products Affected
fortinet
- forticlient
CWE
CWE-134
Use of Externally-Controlled Format String