Format string vulnerability in Fortinet FortiClient 3.0.614, and possibly earlier, allows local users to execute arbitrary code via format string specifiers in the VPN connection name.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/502602/100/0/threaded | mailing list |
http://www.layereddefense.com/FortiClient02Apr.html | |
http://secunia.com/advisories/34524 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/34343 | vdb entry |
http://osvdb.org/53266 | vdb entry |
http://www.vupen.com/english/advisories/2009/0941 | vdb entry vendor advisory |
http://www.securitytracker.com/id?1021966 | vdb entry |
http://lists.grok.org.uk/pipermail/full-disclosure/2009-April/068583.html | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/49633 | vdb entry |
http://www.securityfocus.com/archive/1/502354/100/0/threaded | mailing list |