A buffer copy without checking size of input ('classic buffer overflow') in Fortinet FortiMail webmail and administrative interface version 6.4.0 through 6.4.4 and before 6.2.6 and FortiNDR administrative interface version 7.2.0 and before 7.1.0 allows an authenticated attacker with regular webmail access to trigger a buffer overflow and to possibly execute unauthorized code or commands via specifically crafted HTTP requests.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-21-023 |
![]() ![]() |
History
Mon, 31 Mar 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 31 Mar 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A buffer copy without checking size of input ('classic buffer overflow') in Fortinet FortiMail webmail and administrative interface version 6.4.0 through 6.4.4 and before 6.2.6 and FortiNDR administrative interface version 7.2.0 and before 7.1.0 allows an authenticated attacker with regular webmail access to trigger a buffer overflow and to possibly execute unauthorized code or commands via specifically crafted HTTP requests. | |
First Time appeared |
Fortinet
Fortinet fortimail |
|
Weaknesses | CWE-120 | |
CPEs | cpe:2.3:a:fortinet:fortimail:5.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.0.10:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.0.11:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.0.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.0.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.0.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.0.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.0.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.0.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.0.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.0.8:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.0.9:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.1.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.1.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.1.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.1.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.1.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.1.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.1.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.1.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.2.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.2.10:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.2.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.2.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.2.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.2.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.2.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.2.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.2.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.2.8:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.2.9:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.3.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.3.10:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.3.12:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.3.13:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.3.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.3.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.3.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.3.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.3.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.3.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.3.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.3.8:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.3.9:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.4.10:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.4.11:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.4.12:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.4.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.4.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.4.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.4.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.4.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.4.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.4.8:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:5.4.9:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.0.10:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.0.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.0.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.0.8:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.0.9:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.2.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.2.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.2.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.2.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.2.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.2.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.2.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.4.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.4.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimail:6.4.4:*:*:*:*:*:*:* |
|
Vendors & Products |
Fortinet
Fortinet fortimail |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2025-03-31T15:30:12.990Z
Reserved: 2023-05-22T07:58:22.197Z
Link: CVE-2023-33302

Updated: 2025-03-31T15:29:11.903Z

Status : Awaiting Analysis
Published: 2025-03-31T15:15:41.680
Modified: 2025-04-01T20:26:30.593
Link: CVE-2023-33302

No data.