Access to NULL pointer in SSL VPN portal

Summary

An access of uninitialized pointer vulnerability [CWE-824] in the SSL VPN portal of FortiOS & FortiProxy may allow a remote unauthenticated or authenticated (see Affected Products section) attacker to crash the sslvpn daemon via an HTTP GET request.

Version Affected Solution
FortiOS 7.2 7.2.0 Upgrade to 7.2.1 or above
FortiOS 7.0 7.0.0 through 7.0.5 Upgrade to 7.0.6 or above
FortiOS 6.4 6.4.0 through 6.4.9 (6.4.0 through 6.4.3 Need to be authenticated to provoke a crash) Upgrade to 6.4.10 or above
FortiOS 6.2 6.2.0 through 6.2.10 (6.2.0 through 6.2.10 eed to be authenticated to provoke a crash) Upgrade to 6.2.11 or above
FortiOS 6.0 6.0 all versions (Need to be authenticated to provoke a crash) Migrate to a fixed release
FortiProxy 7.2 Not affected Not Applicable
FortiProxy 7.0 7.0.0 through 7.0.4 Upgrade to 7.0.5 or above
FortiProxy 2.0 2.0.0 through 2.0.9 (Need to be authenticated to provoke a crash) Upgrade to 2.0.10 or above
FortiProxy 1.2 1.2.6 through 1.2.13 (Need to be authenticated to provoke a crash) Migrate to a fixed release
FortiProxy 1.1 Not affected Not Applicable
FortiProxy 1.0 Not affected Not Applicable
Follow the recommended upgrade path using our tool at: https://docs.fortinet.com/upgrade-tool

Acknowledgement

Internally discovered in the frame of an internal audit.