mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
73 lines
2.5 KiB
JSON
73 lines
2.5 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "psirt@fortinet.com",
|
|
"DATE_PUBLIC": "2017-12-12T00:00:00",
|
|
"ID": "CVE-2017-7344",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "FortiClientWindows",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "5.6.0, 5.4.3, 5.4.2, 5.4.1, 5.4.0"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Fortinet, Inc."
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A privilege escalation in Fortinet FortiClient Windows 5.4.3 and earlier as well as 5.6.0 allows attacker to gain privilege via exploiting the Windows \"security alert\" dialog thereby popping up when the \"VPN before logon\" feature is enabled and an untrusted certificate chain."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Escalation of privilege"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://securite.intrinsec.com/2017/12/22/cve-2017-7344-fortinet-forticlient-windows-privilege-escalation-at-logon/",
|
|
"refsource": "MISC",
|
|
"url": "https://securite.intrinsec.com/2017/12/22/cve-2017-7344-fortinet-forticlient-windows-privilege-escalation-at-logon/"
|
|
},
|
|
{
|
|
"name": "102176",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/102176"
|
|
},
|
|
{
|
|
"name": "https://fortiguard.com/advisory/FG-IR-17-070",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://fortiguard.com/advisory/FG-IR-17-070"
|
|
}
|
|
]
|
|
}
|
|
} |