Access to NULL pointer in SSL VPN portal
Summary
An access of uninitialized pointer vulnerability [CWE-824] in the SSL VPN portal of FortiOS & FortiProxy may allow a remote unauthenticated or authenticated (see Affected Products section) attacker to crash the sslvpn daemon via an HTTP GET request.
| Version | Affected | Solution |
|---|---|---|
| FortiOS 7.2 | 7.2.0 | Upgrade to 7.2.1 or above |
| FortiOS 7.0 | 7.0.0 through 7.0.5 | Upgrade to 7.0.6 or above |
| FortiOS 6.4 | 6.4.0 through 6.4.9 (6.4.0 through 6.4.3 Need to be authenticated to provoke a crash) | Upgrade to 6.4.10 or above |
| FortiOS 6.2 | 6.2.0 through 6.2.10 (6.2.0 through 6.2.10 eed to be authenticated to provoke a crash) | Upgrade to 6.2.11 or above |
| FortiOS 6.0 | 6.0 all versions (Need to be authenticated to provoke a crash) | Migrate to a fixed release |
| FortiProxy 7.2 | Not affected | Not Applicable |
| FortiProxy 7.0 | 7.0.0 through 7.0.4 | Upgrade to 7.0.5 or above |
| FortiProxy 2.0 | 2.0.0 through 2.0.9 (Need to be authenticated to provoke a crash) | Upgrade to 2.0.10 or above |
| FortiProxy 1.2 | 1.2.6 through 1.2.13 (Need to be authenticated to provoke a crash) | Migrate to a fixed release |
| FortiProxy 1.1 | Not affected | Not Applicable |
| FortiProxy 1.0 | Not affected | Not Applicable |