Multiple instances of heap-based buffer overflow in the command shell of FortiSandbox before 4.0.0 may allow an authenticated attacker to manipulate memory and alter its content by means of specifically crafted command line arguments.
References
Link | Resource |
---|---|
https://fortiguard.com/advisory/FG-IR-20-188 | Vendor Advisory |
https://fortiguard.com/advisory/FG-IR-20-188 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.com/advisory/FG-IR-20-188 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 6.4 |
Information
Published : 2021-08-04 18:15
Updated : 2024-11-21 05:55
NVD link : CVE-2021-26096
Mitre link : CVE-2021-26096
CVE.ORG link : CVE-2021-26096
JSON object : View
Products Affected
fortinet
- fortisandbox
CWE
CWE-787
Out-of-bounds Write