A stack buffer overflow vulnerability in FortiClient for Linux 6.2.1 and below may allow a user with low privilege to cause FortiClient processes running under root priviledge crashes via sending specially crafted "StartAvCustomScan" type IPC client requests to the fctsched process due the argv data not been well sanitized.
Metrics
Affected Vendors & Products
References
History
Fri, 25 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-25T14:03:49.458Z
Reserved: 2019-10-16T00:00:00
Link: CVE-2019-17652

Updated: 2024-08-05T01:47:13.604Z

Status : Modified
Published: 2020-02-06T16:15:12.353
Modified: 2024-11-21T04:32:42.467
Link: CVE-2019-17652

No data.