Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-29178


A access of uninitialized pointer vulnerability [CWE-824] in Fortinet FortiProxy version 7.2.0 through 7.2.3 and before 7.0.9 and FortiOS version 7.2.0 through 7.2.4 and before 7.0.11 allows an authenticated attacker to repetitively crash the httpsd process via crafted HTTP or HTTPS requests.


Published

2023-06-13T09:15:17.077

Last Modified

2024-11-21T07:56:39.910

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 4.3 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-824
  • Type: Primary
    CWE-824

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application fortinet fortiproxy ≤ 1.1.6 Yes
Application fortinet fortiproxy ≤ 1.2.13 Yes
Application fortinet fortiproxy ≤ 2.0.12 Yes
Application fortinet fortiproxy ≤ 7.0.9 Yes
Application fortinet fortiproxy 7.2.0 Yes
Application fortinet fortiproxy 7.2.1 Yes
Application fortinet fortiproxy 7.2.2 Yes
Application fortinet fortiproxy 7.2.3 Yes
Operating System fortinet fortios ≤ 6.0.17 Yes
Operating System fortinet fortios ≤ 6.2.15 Yes
Operating System fortinet fortios ≤ 6.4.13 Yes
Operating System fortinet fortios ≤ 7.0.11 Yes
Operating System fortinet fortios ≤ 7.2.4 Yes

References