First published: Thu Feb 06 2020(Updated: )
A Denial of service (DoS) vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to cause FortiClient processes running under root privilege crashes via sending specially crafted IPC client requests to the fctsched process due the nanomsg not been correctly validated.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Forticlient | <=6.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16152 is a Denial of Service (DoS) vulnerability in FortiClient for Linux 6.2.1 and below.
CVE-2019-16152 allows a user with low privilege to cause FortiClient processes running under root privilege to crash by sending specially crafted IPC client requests to the fctsched process.
CVE-2019-16152 has a severity rating of 6.5 (medium).
To fix CVE-2019-16152, users should upgrade their FortiClient for Linux to version 6.2.2 or above.
More information about CVE-2019-16152 can be found at the following references: [link1](https://danishcyberdefence.dk/blog/forticlient_linux), [link2](https://fortiguard.com/psirt/FG-IR-19-238)