A Stack-based Buffer Overflow vulnerability in the HTTPD daemon of FortiOS 6.0.10 and below, 6.2.2 and below and FortiProxy 1.0.x, 1.1.x, 1.2.9 and below, 2.0.0 and below may allow an authenticated remote attacker to crash the service by sending a malformed PUT request to the server. Fortinet is not aware of any successful exploitation of this vulnerability that would lead to code execution.

Project Subscriptions

Vendors Products
Fortinet Subscribe
Fortios Subscribe
Fortiproxy Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2019-7962 A Stack-based Buffer Overflow vulnerability in the HTTPD daemon of FortiOS 6.0.10 and below, 6.2.2 and below and FortiProxy 1.0.x, 1.1.x, 1.2.9 and below, 2.0.0 and below may allow an authenticated remote attacker to crash the service by sending a malformed PUT request to the server. Fortinet is not aware of any successful exploitation of this vulnerability that would lead to code execution.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 25 Oct 2024 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2024-10-25T13:59:10.561Z

Reserved: 2019-10-16T00:00:00.000Z

Link: CVE-2019-17656

cve-icon Vulnrichment

Updated: 2024-08-05T01:47:13.701Z

cve-icon NVD

Status : Modified

Published: 2021-04-12T15:15:13.827

Modified: 2024-11-21T04:32:42.930

Link: CVE-2019-17656

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses