A access of uninitialized pointer in Fortinet FortiOS version 7.2.0, 7.0.0 through 7.0.5, 6.4.0 through 6.4.8, 6.2.0 through 6.2.10, 6.0.x, FortiProxy version 7.0.0 through 7.0.4, 2.0.0 through 2.0.9, 1.2.x allows a remote unauthenticated or authenticated attacker to crash the sslvpn daemon via an HTTP GET request.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-22-086 |
![]() ![]() |
History
Fri, 25 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-25T13:29:37.823Z
Reserved: 2022-04-11T00:00:00
Link: CVE-2022-29055

Updated: 2024-08-03T06:10:59.155Z

Status : Modified
Published: 2022-10-18T15:15:09.620
Modified: 2024-11-21T06:58:25.150
Link: CVE-2022-29055

No data.