A buffer overflow [CWE-121] in the TFTP client library of FortiOS before 6.4.7 and FortiOS 7.0.0 through 7.0.2, may allow an authenticated local attacker to achieve arbitrary code execution via specially crafted command line arguments.
References
Link | Resource |
---|---|
https://fortiguard.com/advisory/FG-IR-21-173 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
18 Jan 2024, 15:48
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:* |
29 Aug 2023, 19:49
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:fortinet:fortiweb:6.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortios-6k7k:6.4.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortirecorder_firmware:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortiswitch:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiproxy:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortios-6k7k:6.4.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiweb:6.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:*:*:*:*:entreprise:*:*:* cpe:2.3:a:fortinet:fortios-6k7k:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiproxy:7.0.1:*:*:*:*:*:*:* |
|
First Time |
Fortinet fortiproxy
Fortinet fortindr Fortinet fortiportal Fortinet fortiadc Fortinet fortimail Fortinet fortivoice Fortinet fortirecorder Firmware Fortinet fortios-6k7k Fortinet fortiswitch |
08 Aug 2023, 14:21
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-787 |
Information
Published : 2021-12-08 11:15
Updated : 2024-02-28 18:48
NVD link : CVE-2021-42757
Mitre link : CVE-2021-42757
CVE.ORG link : CVE-2021-42757
JSON object : View
Products Affected
fortinet
- fortimanager
- fortios-6k7k
- fortiproxy
- fortiweb
- fortirecorder_firmware
- fortios
- fortianalyzer
- fortiadc
- fortiswitch
- fortindr
- fortimail
- fortivoice
- fortiportal
CWE
CWE-787
Out-of-bounds Write