René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

146 lines
5.0 KiB
JSON

{
"id": "CVE-2022-29055",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2022-10-18T15:15:09.620",
"lastModified": "2022-10-20T19:13:12.883",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A access of uninitialized pointer in Fortinet FortiOS version 7.2.0, 7.0.0 through 7.0.5, 6.4.0 through 6.4.8, 6.2.0 through 6.2.10, 6.0.x, FortiProxy version 7.0.0 through 7.0.4, 2.0.0 through 2.0.9, 1.2.x allows a remote unauthenticated or authenticated attacker to crash the sslvpn daemon via an HTTP GET request."
},
{
"lang": "es",
"value": "Un acceso de puntero no inicializado en Fortinet FortiOS versi\u00f3n 7.2.0, 7.0.0 hasta 7.0.5, 6.4.0 hasta 6.4.8, 6.2.0 hasta 6.2.10, 6.0.x, FortiProxy versi\u00f3n 7. 0.0 hasta 7.0.4, 2.0.0 hasta 2.0.9, 1.2.x permite a un atacante remoto no autenticado o autenticado bloquear el demonio sslvpn por medio de una petici\u00f3n HTTP GET"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-824"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.2.6",
"versionEndExcluding": "1.2.13",
"matchCriteriaId": "95DEEC45-DE3D-4C1D-8FA3-163BF6FC12A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.0",
"versionEndExcluding": "2.0.10",
"matchCriteriaId": "4FAF62D3-E63F-4987-B030-5646E32FE6EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndExcluding": "7.0.7",
"matchCriteriaId": "B778AD94-D279-42B4-A062-8231F14936B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F302F8-482A-4DA9-BDD9-63886B202B52"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndExcluding": "6.2.11",
"matchCriteriaId": "38DA2E7D-2367-45B6-96FE-4BA3C0C75E85"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.0",
"versionEndExcluding": "6.4.10",
"matchCriteriaId": "6A7730E2-63AD-48F2-AE0A-6C8C9369A734"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndExcluding": "7.0.7",
"matchCriteriaId": "A86B1AB3-F33E-461C-A19C-C3A51B47AC5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B9B87A2A-4C83-448B-8009-AD20214D58CB"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-22-086",
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}