First published: Thu Sep 03 2015(Updated: )
The (1) mdare64_48.sys, (2) mdare32_48.sys, (3) mdare32_52.sys, and (4) mdare64_52.sys drivers in Fortinet FortiClient before 5.2.4 allow local users to read arbitrary kernel memory via a 0x22608C ioctl call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient Virtual Private Network | <=5.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4077 has been classified as a high severity vulnerability due to its potential for local users to read arbitrary kernel memory.
To fix CVE-2015-4077, upgrade Fortinet FortiClient to version 5.2.4 or later.
CVE-2015-4077 affects Fortinet FortiClient versions prior to 5.2.4.
CVE-2015-4077 is an information exposure vulnerability allowing local users unauthorized access to sensitive kernel memory.
No, CVE-2015-4077 is only exploitable by local users with access to the affected system.