SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Fortinet FortiClient Vendors:   Fortinet
FortiClient DeviceExtension Lets Local Users Gain System Privileges
SecurityTracker Alert ID:  1019415
SecurityTracker URL:  http://securitytracker.com/id/1019415
CVE Reference:   CVE-2008-0779   (Links to External Site)
Updated:  Mar 13 2008
Original Entry Date:  Feb 14 2008
Impact:   Execution of arbitrary code via local system, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 3.0 MR5 Patch3 and prior versions
Description:   A vulnerability was reported in FortiClient. A local user can obtain system privileges on the target system.

The driver's DeviceExtension is not properly initialized. A local user can send a specially crafted request to execute arbitrary commands on the target system with kernel-level privileges.

The vendor was notified on January 18, 2008.

Reversemode.com reported this vulnerability.

Impact:   A local user can obtain system privileges on the target system.
Solution:   The vendor has issued a fix (3.0 MR5 Patch 4 or version 3.0 MR6)

The Fortinet advisory is available at:

http://kc.forticare.com/default.asp?id=3618

Vendor URL:  kc.forticare.com/default.asp?id=3618 (Links to External Site)
Cause:   Access control error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC