Rapid7 Vulnerability & Exploit Database

Fortinet FortiManager: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CVE-2021-24022)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Fortinet FortiManager: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CVE-2021-24022)

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:P)
Published
07/20/2021
Created
08/06/2021
Added
08/05/2021
Modified
08/05/2021

Description

A buffer overflow vulnerability in FortiAnalyzer CLI 6.4.5 and below, 6.2.7 and below, 6.0.x and FortiManager CLI 6.4.5 and below, 6.2.7 and below, 6.0.x may allow an authenticated, local attacker to perform a Denial of Service attack by running the `diagnose system geoip-city` command with a large ip value.

Solution(s)

  • fortinet-fortimanager-upgrade-6_2_7
  • fortinet-fortimanager-upgrade-6_2_8
  • fortinet-fortimanager-upgrade-6_4_5
  • fortinet-fortimanager-upgrade-6_4_6
  • fortinet-fortimanager-upgrade-7_0_0

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;