Home
MEDIUM: 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:U/RL:X/RC:XDefault status
unaffected
6.0.0 (semver)
affected
5.6.0 (semver)
affected
Description
Under non-default configuration, a stack-based buffer overflow in FortiOS version 6.0.10 and below, version 5.6.12 and below may allow a remote attacker authenticated to the SSL VPN to crash the FortiClient NAC daemon (fcnacd) and potentially execute arbitrary code via requesting a large FortiClient file name. We are not aware of proof of concept code successfully achieving the latter.
Problem types
Execute unauthorized code or commands
Product status
6.0.0 (semver)
5.6.0 (semver)
References
fortiguard.fortinet.com/psirt/FG-IR-20-083