The (1) mdare64_48.sys, (2) mdare32_48.sys, (3) mdare32_52.sys, (4) mdare64_52.sys, and (5) Fortishield.sys drivers in Fortinet FortiClient before 5.2.4 do not properly restrict access to the API for management of processes and the Windows registry, which allows local users to obtain a privileged handle to a PID and possibly have unspecified other impact, as demonstrated by a 0x2220c8 ioctl call.
References
Configurations
History
21 Nov 2024, 02:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://fortiguard.com/advisory/mulitple-vulnerabilities-in-forticlient - | |
References | () http://packetstormsecurity.com/files/133398/FortiClient-Antivirus-Information-Exposure-Access-Control.html - | |
References | () http://seclists.org/fulldisclosure/2015/Sep/0 - | |
References | () http://www.coresecurity.com/advisories/forticlient-antivirus-multiple-vulnerabilities - | |
References | () http://www.fortiguard.com/advisory/mulitple-vulnerabilities-in-forticlient - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/536369/100/0/threaded - | |
References | () http://www.securitytracker.com/id/1033439 - |
Information
Published : 2015-09-03 14:59
Updated : 2024-11-21 02:33
NVD link : CVE-2015-5737
Mitre link : CVE-2015-5737
CVE.ORG link : CVE-2015-5737
JSON object : View
Products Affected
fortinet
- forticlient
CWE
CWE-264
Permissions, Privileges, and Access Controls