<?xml version="1.0" encoding="UTF-8"?>
<cvrf:cvrfdoc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
    <cvrf:DocumentTitle>Integer overflow in dhcpd daemon</cvrf:DocumentTitle>
    <cvrf:DocumentType>Fortinet PSIRT Advisories</cvrf:DocumentType>
    <cvrf:DocumentPublisher Type="Vendor">
        <cvrf:ContactDetails>
            Fortinet PSIRT Contact:
            Website: https://fortiguard.fortinet.com/faq/psirt-contact
        </cvrf:ContactDetails>
     </cvrf:DocumentPublisher>
    <cvrf:DocumentTracking>
        <cvrf:Identification>
            <cvrf:ID>FG-IR-21-155</cvrf:ID>
        </cvrf:Identification>
        <cvrf:Status>Final</cvrf:Status>
        <cvrf:Version>1</cvrf:Version>
        <cvrf:RevisionHistory>
            <cvrf:Revision>
                <cvrf:Number>1</cvrf:Number>
                <cvrf:Date>2022-07-05T00:00:00</cvrf:Date>
                <cvrf:Description>Current version</cvrf:Description>
        </cvrf:Revision>
       </cvrf:RevisionHistory>
        <cvrf:InitialReleaseDate>2022-07-05T00:00:00</cvrf:InitialReleaseDate>
        <cvrf:CurrentReleaseDate>2022-07-05T00:00:00</cvrf:CurrentReleaseDate>
    </cvrf:DocumentTracking>
    <cvrf:DocumentNotes>
        <cvrf:Note Title="Summary" Type="Summary" Ordinal="1">
            An integer overflow / wraparound vulnerability [CWE-190] in the FortiOS, FortiProxy, FortiSwitch, FortiRecoder, and FortiVoiceEnterprisedhcpd daemon may allow an unauthenticated and network adjacent attacker to crash the dhcpd deamon, resulting in potential denial of service.
        </cvrf:Note>
        <cvrf:Note Title="Description" Type="General" Ordinal="2">
            None
        </cvrf:Note>
        <cvrf:Note Title="Impact" Type="General" Ordinal="3">
            Denial of service
        </cvrf:Note>
        <cvrf:Note Title="Affected Products" Type="General" Ordinal="4">
            FortiOS version 7.0.3 and below.FortiOS version 6.4.8 and below.FortiOS version 6.2.10 and below.FortiOS version 6.0.x.FortiProxy version 7.0.0.Fortiproxy version 2.0.6 and below.FortiProxy version 1.2.x.FortiProxy version 1.1.x.FortiProxy version 1.0.x.FortiSwitch version 7.0.2 and below.FortiSwitch version 6.4.9 and below.FortiSwitch version 6.2.x.FortiSwitch version 6.0.x.FortiRecorder version 6.4.2 and below.FortiRecorder version 6.0.10 and below.FortiVoiceEnterprise version 6.4.3 and below.FortiVoiceEnterprise version 6.0.10 and below.
        </cvrf:Note>
        <cvrf:Note Title="Solutions" Type="General" Ordinal="5">
            Please upgrade to FortiOS version 7.0.4 or above.Please upgrade to FortiOS version 6.4.9 or above.Please upgrade to FortiOS version 6.2.11 or above.Please upgrade to FortiProxy version 7.0.1 or above.Please upgrade to FortiProxy version 2.0.7 or above.Please upgrade to FortiSwitch version 7.2.0 or above.Please upgrade to FortiSwitch version 7.0.3 or above.Please upgrade to FortiSwitch version 6.4.10 or above.Please upgrade to FortiRecorder version 6.4.3 or above.Please upgrade to FortiRecorder version 6.0.11 or above.Please upgrade to FortiVoiceEnterprise version 6.4.4 or abovePlease upgrade to FortiVoiceEnterprise version 6.0.11 or above
        </cvrf:Note>
    </cvrf:DocumentNotes>
    <cvrf:Acknowledgments>
        <cvrf:Acknowledgment>
            <cvrf:Description>Fortinet is pleased to thank Nanyu Zhong and Yu Zhang from VARAS@IIE for reporting this vulnerability under responsible disclosure.</cvrf:Description>
        </cvrf:Acknowledgment>
    </cvrf:Acknowledgments>
    <Vulnerability Ordinal="1">
        <Title>Integer overflow in dhcpd daemon</Title>
        <cvrf:CVE>CVE-2021-42755</cvrf:CVE>
        <CVSSScoreSets>
            <ScoreSetV3>
                <BaseScoreV3>4.2</BaseScoreV3>
                <VectorV3>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:F/RL:U/RC:C</VectorV3>
            </ScoreSetV3>
        </CVSSScoreSets>
        <References Type="Self">
            <Reference>
                <URL>https://fortiguard.fortinet.com/psirt/FG-IR-21-155</URL>
                <Description>Integer overflow in dhcpd daemon</Description>
            </Reference>Reference>
        </References>
    </Vulnerability>
</cvrf:cvrfdoc>