Page 14 of 67 results (0.006 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

The fortimon.sys device driver in Fortinet FortiClient Host Security 3.0 MR5 Patch 3 and earlier does not properly initialize its DeviceExtension, which allows local users to access kernel memory and execute arbitrary code via a crafted request. El controlador de dispositivo fortimon.sys en Fortinet FortiClient Host Security versión 3.0 MR5 Parche 3 y versiones anteriores, no inicializa apropiadamente su DeviceExtension, lo que permite a los usuarios locales acceder a la memoria del kernel y ejecutar código arbitrario por medio de una petición diseñada. • http://kc.forticare.com/default.asp?id=3618 http://secunia.com/advisories/28975 http://securityreason.com/securityalert/3660 http://www.reversemode.com/index.php?option=com_mamblog&Itemid=15&task=show&action=view&id=47&Itemid=15 http://www.securityfocus.com/archive/1/488071/100/0/threaded http://www.securityfocus.com/bid/27776 http://www.securitytracker.com/id?1019415 http://www.vupen.com/english/advisories/2008/0541/references https://exchange.xforce.ibmcloud.com/vulnerabilities/40512 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 1%CPEs: 6EXPL: 0

The Internet Key Exchange version 1 (IKEv1) implementations in Fortinet FortiOS 2.50, 2.80 and 3.0, FortiClient 2.0,; and FortiManager 2.80 and 3.0 allow remote attackers to cause a denial of service (termination of a process that is automatically restarted) via IKE packets with invalid values of certain IPSec attributes, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the vendor advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to. • http://secunia.com/advisories/18446 http://www.fortinet.com/FortiGuardCenter/VU226364.html http://www.securityfocus.com/bid/15997 http://www.vupen.com/english/advisories/2006/0182 •