Multiple instances of incorrect calculation of buffer size in the Webmail and Administrative interface of FortiMail before 6.4.5 may allow an authenticated attacker with regular webmail access to trigger a buffer overflow and to possibly execute unauthorized code or commands via specifically crafted HTTP requests.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.com/advisory/FG-IR-21-023 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-25T13:56:52.894Z
Reserved: 2021-01-04T00:00:00
Link: CVE-2021-22129

No data.

Status : Modified
Published: 2021-07-09T19:15:08.073
Modified: 2024-11-21T05:49:33.650
Link: CVE-2021-22129

No data.