First published: Wed Jul 07 2021(Updated: )
A buffer copy without checking size of input ('classic buffer overflow') in Fortinet FortiMail webmail and administrative interface version 6.4.0 through 6.4.4 and before 6.2.6 and FortiNDR administrative interface version 7.2.0 and before 7.1.0 allows an authenticated attacker with regular webmail access to trigger a buffer overflow and to possibly execute unauthorized code or commands via specifically crafted HTTP requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Fortimail-200d | >=6.4.0<6.4.4<6.2.6 | |
FortiNDR | <7.1.0>=7.2.0 |
Please upgrade to FortiMail version 7.0.0 or above Please upgrade to FortiMail version 6.4.5 or above Please upgrade to FortiMail version 6.2.7 or above Please upgrade to FortiMail version 6.0.11 or above Please upgrade to FortiNDR version 7.2.1 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-33302 has a high severity due to the potential for authenticated attackers to exploit a buffer overflow vulnerability.
To mitigate CVE-2023-33302, update FortiMail to version 6.4.5 or higher and FortiNDR to version 7.1.1 or higher as recommended by Fortinet.
CVE-2023-33302 may allow authenticated attackers to execute arbitrary code or cause a denial of service on affected systems.
CVE-2023-33302 affects FortiMail versions 6.4.0 to 6.4.4 and versions prior to 6.2.6, as well as FortiNDR versions 7.2.0 and below 7.1.0.
As of the latest reports, there are indications that CVE-2023-33302 may be under active exploitation, emphasizing the need for immediate updates.