A buffer copy without checking size of input ('classic buffer overflow') in Fortinet FortiAnalyzer version 7.0.2 and below, version 6.4.7 and below, version 6.2.9 and below, version 6.0.11 and below, version 5.6.11 and below, FortiManager version 7.0.2 and below, version 6.4.7 and below, version 6.2.9 and below, version 6.0.11 and below, version 5.6.11 and below, FortiOS version 7.0.0 through 7.0.4, 6.4.0 through 6.4.8, 6.2.0 through 6.2.10, 6.0.x and FortiProxy version 7.0.0 through 7.0.3, 2.0.0 through 2.0.8, 1.2.x, 1.1.x and 1.0.x allows attacker to execute unauthorized code or commands via crafted CLI `execute restore image` and `execute certificate remote` operations with the tFTP protocol.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Sep 2024 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 17 Sep 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:o:fortinet:fortianalyzer:5.6.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.11:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:5.6.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.11:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.12:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.0.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.11:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.12:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.2.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.4.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.4.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.4.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.4.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.4.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.4.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.4.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:6.4.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:7.0.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:7.0.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortianalyzer:7.0.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.11:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:5.6.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.11:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.12:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.0.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.11:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.12:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.2.9:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.4.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.4.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.4.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.4.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.4.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.4.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.4.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:6.4.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:7.0.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:7.0.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortimanager:7.0.2:*:*:*:*:*:*:* |

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-09-17T14:05:39.988Z
Reserved: 2021-10-28T21:06:26.047Z
Link: CVE-2021-43072

Updated: 2024-08-04T03:47:13.197Z

Status : Modified
Published: 2023-07-18T03:15:54.947
Modified: 2024-11-21T06:28:38.490
Link: CVE-2021-43072

No data.