cvelist/2016/6xxx/CVE-2016-6909.json
2019-03-18 04:45:10 +00:00

87 lines
2.9 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-6909",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the Cookie parser in Fortinet FortiOS 4.x before 4.1.11, 4.2.x before 4.2.13, and 4.3.x before 4.3.9 and FortiSwitch before 3.4.3 allows remote attackers to execute arbitrary code via a crafted HTTP request, aka EGREGIOUSBLUNDER."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://fortiguard.com/advisory/FG-IR-16-023",
"refsource": "CONFIRM",
"url": "http://fortiguard.com/advisory/FG-IR-16-023"
},
{
"name": "https://musalbas.com/2016/08/16/equation-group-firewall-operations-catalogue.html",
"refsource": "MISC",
"url": "https://musalbas.com/2016/08/16/equation-group-firewall-operations-catalogue.html"
},
{
"name": "1036643",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036643"
},
{
"name": "http://packetstormsecurity.com/files/138387/EGREGIOUSBLUNDER-Fortigate-Remote-Code-Execution.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/138387/EGREGIOUSBLUNDER-Fortigate-Remote-Code-Execution.html"
},
{
"name": "40276",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40276/"
},
{
"name": "92523",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92523"
}
]
}
}