ID

VAR-202002-0422


CVE

CVE-2019-17652


TITLE

Linux for FortiClient Out-of-bounds write vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2019-014573

DESCRIPTION

A stack buffer overflow vulnerability in FortiClient for Linux 6.2.1 and below may allow a user with low privilege to cause FortiClient processes running under root priviledge crashes via sending specially crafted "StartAvCustomScan" type IPC client requests to the fctsched process due the argv data not been well sanitized. Linux for FortiClient Is vulnerable to out-of-bounds writes.Service operation interruption (DoS) It may be put into a state. Fortinet FortiClient is a mobile terminal security solution developed by Fortinet. The solution provides IPsec and SSL encryption, WAN optimization, endpoint compliance, and two-factor authentication when connected to FortiGate firewall appliances. A buffer error vulnerability exists in Fortinet FortiClient 6.2.1 and earlier versions based on the Linux platform. Attackers can use this vulnerability to cause denial of service through IPC sockets

Trust: 1.71

sources: NVD: CVE-2019-17652 // JVNDB: JVNDB-2019-014573 // VULHUB: VHN-149920

AFFECTED PRODUCTS

vendor:fortinetmodel:forticlientscope:eqversion:6.2.1

Trust: 1.4

vendor:fortinetmodel:forticlientscope:lteversion:6.2.1

Trust: 1.0

vendor:fortinetmodel:forticlientscope:eqversion:6.0.3

Trust: 0.6

vendor:fortinetmodel:forticlientscope:eqversion:6.0.6

Trust: 0.6

vendor:fortinetmodel:forticlientscope:eqversion:6.0.0

Trust: 0.6

vendor:fortinetmodel:forticlientscope:eqversion:6.2.0

Trust: 0.6

vendor:fortinetmodel:forticlientscope:eqversion:6.0.1

Trust: 0.6

vendor:fortinetmodel:forticlientscope:eqversion:6.0.2

Trust: 0.6

vendor:fortinetmodel:forticlientscope:eqversion:6.0.5

Trust: 0.6

vendor:fortinetmodel:forticlientscope:eqversion:6.0.4

Trust: 0.6

vendor:fortinetmodel:forticlientscope:eqversion:6.0.8

Trust: 0.6

sources: JVNDB: JVNDB-2019-014573 // CNNVD: CNNVD-201911-1062 // NVD: CVE-2019-17652

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-17652
value: MEDIUM

Trust: 1.0

NVD: JVNDB-2019-014573
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201911-1062
value: MEDIUM

Trust: 0.6

VULHUB: VHN-149920
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-17652
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2019-014573
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-149920
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-17652
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: JVNDB-2019-014573
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-149920 // JVNDB: JVNDB-2019-014573 // CNNVD: CNNVD-201911-1062 // NVD: CVE-2019-17652

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.9

sources: VULHUB: VHN-149920 // JVNDB: JVNDB-2019-014573 // NVD: CVE-2019-17652

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201911-1062

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201911-1062

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-014573

PATCH

title:FG-IR-19-238url:https://fortiguard.com/psirt/FG-IR-19-238

Trust: 0.8

title:Fortinet FortiClient Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=108204

Trust: 0.6

sources: JVNDB: JVNDB-2019-014573 // CNNVD: CNNVD-201911-1062

EXTERNAL IDS

db:NVDid:CVE-2019-17652

Trust: 2.5

db:JVNDBid:JVNDB-2019-014573

Trust: 0.8

db:CNNVDid:CNNVD-201911-1062

Trust: 0.7

db:AUSCERTid:ESB-2019.4350.2

Trust: 0.6

db:AUSCERTid:ESB-2019.4350

Trust: 0.6

db:VULHUBid:VHN-149920

Trust: 0.1

sources: VULHUB: VHN-149920 // JVNDB: JVNDB-2019-014573 // CNNVD: CNNVD-201911-1062 // NVD: CVE-2019-17652

REFERENCES

url:https://fortiguard.com/psirt/fg-ir-19-238

Trust: 2.3

url:https://danishcyberdefence.dk/blog/forticlient_linux

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-17652

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-17652

Trust: 0.8

url:https://vigilance.fr/vulnerability/forticlient-for-linux-four-vulnerabilities-via-ipc-socket-30897

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4350/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4350.2/

Trust: 0.6

sources: VULHUB: VHN-149920 // JVNDB: JVNDB-2019-014573 // CNNVD: CNNVD-201911-1062 // NVD: CVE-2019-17652

SOURCES

db:VULHUBid:VHN-149920
db:JVNDBid:JVNDB-2019-014573
db:CNNVDid:CNNVD-201911-1062
db:NVDid:CVE-2019-17652

LAST UPDATE DATE

2024-11-23T21:51:40.719000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-149920date:2020-02-12T00:00:00
db:JVNDBid:JVNDB-2019-014573date:2020-02-28T00:00:00
db:CNNVDid:CNNVD-201911-1062date:2020-02-13T00:00:00
db:NVDid:CVE-2019-17652date:2024-11-21T04:32:42.467

SOURCES RELEASE DATE

db:VULHUBid:VHN-149920date:2020-02-06T00:00:00
db:JVNDBid:JVNDB-2019-014573date:2020-02-28T00:00:00
db:CNNVDid:CNNVD-201911-1062date:2019-11-18T00:00:00
db:NVDid:CVE-2019-17652date:2020-02-06T16:15:12.353