Heap buffer overflow in websocket
Summary
An heap-based buffer overflow vulnerability [CWE-122] in FortiOS, FortiProxy, FortiPAM, FortiSRA and FortiSwitchManager nodejs daemon may allow an authenticated attacker to execute arbitrary code or commands via specifically crafted requests.
| Version | Affected | Solution |
|---|---|---|
| FortiOS 7.6 | 7.6.0 through 7.6.2 | Upgrade to 7.6.3 or above |
| FortiOS 7.4 | 7.4.0 through 7.4.6 | Upgrade to 7.4.7 or above |
| FortiOS 7.2 | 7.2.0 through 7.2.10 | Upgrade to 7.2.11 or above |
| FortiOS 7.0 | 7.0.2 through 7.0.16 | Upgrade to 7.0.17 or above |
| FortiOS 6.4 | Not affected | Not Applicable |
| FortiPAM 1.7 | Not affected | Not Applicable |
| FortiPAM 1.6 | Not affected | Not Applicable |
| FortiPAM 1.5 | 1.5.0 | Upgrade to 1.5.1 or above |
| FortiPAM 1.4 | 1.4.0 through 1.4.2 | Upgrade to 1.4.3 or above |
| FortiPAM 1.3 | 1.3 all versions | Migrate to a fixed release |
| FortiPAM 1.2 | 1.2 all versions | Migrate to a fixed release |
| FortiPAM 1.1 | 1.1 all versions | Migrate to a fixed release |
| FortiPAM 1.0 | 1.0 all versions | Migrate to a fixed release |
| FortiProxy 7.6 | 7.6.0 through 7.6.1 | Upgrade to 7.6.2 or above |
| FortiProxy 7.4 | 7.4.0 through 7.4.7 | Upgrade to 7.4.8 or above |
| FortiProxy 7.2 | Not affected | Not Applicable |
| FortiProxy 7.0 | Not affected | Not Applicable |
| FortiSRA 1.7 | Not affected | Not Applicable |
| FortiSRA 1.6 | Not affected | Not Applicable |
| FortiSRA 1.5 | 1.5.0 | Upgrade to 1.5.1 or above |
| FortiSRA 1.4 | 1.4.0 through 1.4.2 | Upgrade to 1.4.3 or above |
| FortiSwitchManager 7.2 | 7.2.1 through 7.2.5 | Upgrade to 7.2.6 or above |
| FortiSwitchManager 7.0 | Not affected | Not Applicable |
Virtual Patch named "FG-VD-58637.0day." is available in FMWP db update 25.081