Computer Security
[EN] securityvulns.ru no-pyccku


Fortinet Single Sign buffer overflow
Published:18.03.2015
Source:
SecurityVulns ID:14323
Type:remote
Threat Level:
5/10
Description:Buffer overflow on network messages parsing.
Affected:FORTINET : FSSO Novell eDirectory 4.3
 FORTINET : FSSO Windows Active Directory 4.3
CVE:CVE-2015-2281 (Stack-based buffer overflow in collectoragent.exe in Fortinet Single Sign On (FSSO) before build 164 allows remote attackers to execute arbitrary code via a large PROCESS_HELLO message to the Message Dispatcher on TCP port 8000.)
Original documentdocumentCORE SECURITY TECHNOLOGIES ADVISORIES, [CORE-2015-0006] - Fortinet Single Sign On Stack Overflow (18.03.2015)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod