cvelist/2019/15xxx/CVE-2019-15711.json
2020-02-07 17:01:19 +00:00

67 lines
2.1 KiB
JSON

{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-15711",
"ASSIGNER": "psirt@fortinet.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Fortinet",
"product": {
"product_data": [
{
"product_name": "Fortinet FortiClientLinux",
"version": {
"version_data": [
{
"version_value": "FortiClientLinux 6.2.1 and below"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://fortiguard.com/psirt/FG-IR-19-238",
"url": "https://fortiguard.com/psirt/FG-IR-19-238"
},
{
"refsource": "MISC",
"name": "https://danishcyberdefence.dk/blog/forticlient_linux",
"url": "https://danishcyberdefence.dk/blog/forticlient_linux"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to run system commands under root privilege via injecting specially crafted \"ExportLogs\" type IPC client requests to the fctsched process."
}
]
}
}