First published: Fri Jul 09 2021(Updated: )
Multiple instances of incorrect calculation of buffer size in the Webmail and Administrative interface of FortiMail before 6.4.5 may allow an authenticated attacker with regular webmail access to trigger a buffer overflow and to possibly execute unauthorized code or commands via specifically crafted HTTP requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiMail | <=5.4.12 | |
Fortinet FortiMail | >=5.6.1<6.0.11 | |
Fortinet FortiMail | >=6.2.0<6.2.7 | |
Fortinet FortiMail | >=6.4.0<6.4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-22129.
CVE-2021-22129 has a severity score of 8.8, which is considered high.
CVE-2021-22129 affects FortiMail versions up to 6.4.5.
CVE-2021-22129 may allow an authenticated attacker to trigger a buffer overflow and execute unauthorized code or commands.
Yes, FortiMail version 6.4.5 includes a fix for CVE-2021-22129. It is recommended to update to this version.