An integer overflow / wraparound vulnerability [CWE-190] in FortiSwitch 7.0.2 and below, 6.4.9 and below, 6.2.x, 6.0.x; FortiRecorder 6.4.2 and below, 6.0.10 and below; FortiOS 7.0.2 and below, 6.4.8 and below, 6.2.10 and below, 6.0.x; FortiProxy 7.0.0, 2.0.6 and below, 1.2.x, 1.1.x, 1.0.x; FortiVoiceEnterprise 6.4.3 and below, 6.0.10 and below dhcpd daemon may allow an unauthenticated and network adjacent attacker to crash the dhcpd deamon, resulting in potential denial of service.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-21-155 | Patch Vendor Advisory |
https://fortiguard.com/psirt/FG-IR-21-155 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.com/psirt/FG-IR-21-155 - Patch, Vendor Advisory |
18 Jan 2024, 15:48
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:fortinet:fortivoice:6.0.6:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.7:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:6.4.3:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.23:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.14:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.0:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.18:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.22:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:6.4.0:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:6.4.1:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.6:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.25:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:6.0.2:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.2:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.16:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:6.0.8:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.10:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:6.0.4:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:6.0.0:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.5:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.20:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:6.0.5:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.26:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:6.0.1:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.3:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.1:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.8:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.11:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.19:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.12:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:6.4.2:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.13:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.24:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:6.0.10:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:6.0.3:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:6.0.9:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.21:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.17:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.15:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.4:*:*:*:entreprise:*:*:* |
cpe:2.3:a:fortinet:fortivoice:5.3.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.26:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.23:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:6.0.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.17:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:6.0.8:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.12:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.24:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.18:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.14:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.8:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.13:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:6.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.11:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.25:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:6.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:6.0.9:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:6.4.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.22:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.16:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.15:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:6.0.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.10:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.20:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.19:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:5.3.21:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:6.0.10:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:6.4.3:*:*:*:*:*:*:* |
Information
Published : 2022-07-18 17:15
Updated : 2024-11-21 06:28
NVD link : CVE-2021-42755
Mitre link : CVE-2021-42755
CVE.ORG link : CVE-2021-42755
JSON object : View
Products Affected
fortinet
- fortirecorder_firmware
- fortiproxy
- fortios
- fortiswitch
- fortivoice
CWE
CWE-190
Integer Overflow or Wraparound