First published: Mon Jan 04 2021(Updated: )
A stack-based buffer overflow vulnerability in FortiWeb 6.3.0 through 6.3.7 and version before 6.2.4 may allow a remote, unauthenticated attacker to crash the httpd daemon thread by sending a request with a crafted cookie header.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWeb | <6.2.4 | |
Fortinet FortiWeb | >=6.3.0<=6.3.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-29019 has a high severity rating due to the potential for remote, unauthenticated attackers to exploit it.
To fix CVE-2020-29019, upgrade FortiWeb to version 6.2.4 or later, or to versions 6.3.8 or higher.
CVE-2020-29019 affects FortiWeb versions 6.3.0 through 6.3.7 and versions before 6.2.4.
CVE-2020-29019 is a stack-based buffer overflow vulnerability.
An attacker exploiting CVE-2020-29019 can crash the httpd daemon thread by sending a specially crafted cookie header.