A access of uninitialized pointer vulnerability [CWE-824] in Fortinet FortiProxy version 7.2.0 through 7.2.3 and before 7.0.9 and FortiOS version 7.2.0 through 7.2.4 and before 7.0.11 allows an authenticated attacker to repetitively crash the httpsd process via crafted HTTP or HTTPS requests.
2023-06-13T09:15:17.077
2024-11-21T07:56:39.910
Modified
CVSSv3.1: 4.3 (MEDIUM)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | fortinet | fortiproxy | ≤ 1.1.6 | Yes |
Application | fortinet | fortiproxy | ≤ 1.2.13 | Yes |
Application | fortinet | fortiproxy | ≤ 2.0.12 | Yes |
Application | fortinet | fortiproxy | ≤ 7.0.9 | Yes |
Application | fortinet | fortiproxy | 7.2.0 | Yes |
Application | fortinet | fortiproxy | 7.2.1 | Yes |
Application | fortinet | fortiproxy | 7.2.2 | Yes |
Application | fortinet | fortiproxy | 7.2.3 | Yes |
Operating System | fortinet | fortios | ≤ 6.0.17 | Yes |
Operating System | fortinet | fortios | ≤ 6.2.15 | Yes |
Operating System | fortinet | fortios | ≤ 6.4.13 | Yes |
Operating System | fortinet | fortios | ≤ 7.0.11 | Yes |
Operating System | fortinet | fortios | ≤ 7.2.4 | Yes |