First published: Thu Feb 14 2008(Updated: )
The fortimon.sys device driver in Fortinet FortiClient Host Security 3.0 MR5 Patch 3 and earlier does not properly initialize its DeviceExtension, which allows local users to access kernel memory and execute arbitrary code via a crafted request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient | <=3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0779 is classified as a high severity vulnerability due to its potential to allow local users to execute arbitrary code.
To fix CVE-2008-0779, users should upgrade to a patched version of Fortinet FortiClient Host Security beyond 3.0 MR5 Patch 3.
CVE-2008-0779 can be exploited by local users to gain unauthorized access to kernel memory and execute arbitrary code.
CVE-2008-0779 affects Fortinet FortiClient Host Security versions up to and including 3.0 MR5 Patch 3.
Local users of the affected versions of Fortinet FortiClient Host Security are directly impacted by CVE-2008-0779.