cvelist/2019/5xxx/CVE-2019-5587.json

67 lines
2.1 KiB
JSON
Raw Normal View History

2019-01-07 13:04:46 -05:00
{
2019-06-04 22:00:50 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
2019-03-17 21:30:56 +00:00
"CVE_data_meta": {
"ID": "CVE-2019-5587",
2019-06-04 22:00:50 +00:00
"ASSIGNER": "psirt@fortinet.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Fortinet",
"product": {
"product_data": [
{
"product_name": "Fortinet FortiOS",
"version": {
"version_data": [
{
"version_value": "FortiOS all versions below 6.0.5"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Execute unauthorized code or commands"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://fortiguard.com/advisory/FG-IR-19-017",
"url": "https://fortiguard.com/advisory/FG-IR-19-017"
2019-06-06 12:00:55 +00:00
},
{
"refsource": "BID",
"name": "108628",
"url": "http://www.securityfocus.com/bid/108628"
2019-06-04 22:00:50 +00:00
}
]
2019-03-17 21:30:56 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2019-06-04 22:00:50 +00:00
"value": "Lack of root file system integrity checking in Fortinet FortiOS VM application images all versions below 6.0.5 may allow attacker to implant malicious programs into the installing image by reassembling the image through specific methods."
2019-03-17 21:30:56 +00:00
}
]
}
}