First published: Sat Dec 31 2005(Updated: )
Interpretation conflict in Fortinet FortiGate 2.8, running FortiOS 2.8MR10 and v3beta, allows remote attackers to bypass the URL blocker via an (1) HTTP request terminated with a line feed (LF) and not carriage return line feed (CRLF) or (2) HTTP request with no Host field, which is still processed by most web servers without violating RFC2616.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | <=2.8_mr10 | |
Fortinet FortiOS IPS Engine | <=3_beta | |
Fortinet Fortigate | =2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3058 is considered a medium severity vulnerability due to its potential to allow remote attackers to bypass URL filters.
To fix CVE-2005-3058, upgrade FortiOS to a version that is not affected, such as any version after 2.8MR10 and 3beta.
CVE-2005-3058 affects users running Fortinet FortiGate version 2.8 and FortiOS versions 2.8MR10 and 3beta.
CVE-2005-3058 can be exploited through HTTP requests that either terminate with a line feed (LF) or lack a Host field.
The potential impact of CVE-2005-3058 includes the bypassing of URL blocking measures, which could lead to unauthorized access to harmful content.