[FG-IR-21-023] Multiple buffer overflows in FortiMail
Summary
Multiple instances of incorrect calculation of buffer size in FortiMail webmail and administrative interface and FortiNDR administrative interface may allow an authenticated attacker with regular webmail access to trigger a buffer overflow and to possibly execute unauthorized code or commands via specifically crafted HTTP requests.
Affected Products
FortiMail 6.4.4 and below.
FortiMail 6.2.6 and below.
FortiMail 6.0.10 and below.
FortiMail 5.4.12 and below.
FortiNDR 7.2.1 and below.
FortiNDR 7.1 all versions.
FortiNDR 7.0 all versions.
FortiNDR 1.5 all versions.
FortiNDR 1.4 all versions.
FortiNDR 1.3 all versions.
FortiNDR 1.2 all versions.
FortiNDR 1.1 all versions.
Solutions
Please upgrade to FortiMail version 7.0.0 or above
Please upgrade to FortiMail version 6.4.5 or above
Please upgrade to FortiMail version 6.2.7 or above
Please upgrade to FortiMail version 6.0.11 or above
Please upgrade to FortiNDR version 7.2.1 or above
Acknowledgement
Internally discovered and reported by Giuseppe Cocomazzi of the Fortinet PSIRT Team.Timeline
2021-07-07: Initial publication2025-03-18: Fixed FortiNDR fixed versions