First published: Wed Aug 24 2016(Updated: )
Buffer overflow in the Cookie parser in Fortinet FortiOS 4.x before 4.1.11, 4.2.x before 4.2.13, and 4.3.x before 4.3.9 and FortiSwitch before 3.4.3 allows remote attackers to execute arbitrary code via a crafted HTTP request, aka EGREGIOUSBLUNDER.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FortiOS | >=4.1.0<4.1.11 | |
FortiOS | >=4.2.0<4.2.13 | |
FortiOS | >=4.3.0<4.3.9 | |
Fortinet FortiSwitch | <=3.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6909 has a high severity rating due to its potential for remote code execution.
To fix CVE-2016-6909, upgrade FortiOS to version 4.1.11, 4.2.13, or 4.3.9 or higher, and FortiSwitch to version 3.4.3 or higher.
CVE-2016-6909 affects Fortinet FortiOS versions prior to 4.1.11, 4.2.13, and 4.3.9, as well as FortiSwitch versions up to 3.4.2.
CVE-2016-6909 allows remote attackers to execute arbitrary code through a crafted HTTP request.
Fortinet is responsible for releasing patches and updates to address the vulnerability CVE-2016-6909.