Vulnerability Description
Interpretation conflict in Fortinet FortiGate 2.8, running FortiOS 2.8MR10 and v3beta, allows remote attackers to bypass the URL blocker via an (1) HTTP request terminated with a line feed (LF) and not carriage return line feed (CRLF) or (2) HTTP request with no Host field, which is still processed by most web servers without violating RFC2616.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fortinet | Fortios | <= 2.8_mr10 |
| Fortinet | Fortigate | 2.8 |
Related Weaknesses (CWE)
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-February/042140.html
- http://secunia.com/advisories/18844Vendor Advisory
- http://www.fortiguard.com/advisory/FGA-2006-10.html
- http://www.securityfocus.com/archive/1/424858/100/0/threaded
- http://www.securityfocus.com/bid/16599
- http://www.vupen.com/english/advisories/2006/0539Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24626
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-February/042140.html
- http://secunia.com/advisories/18844Vendor Advisory
- http://www.fortiguard.com/advisory/FGA-2006-10.html
- http://www.securityfocus.com/archive/1/424858/100/0/threaded
- http://www.securityfocus.com/bid/16599
- http://www.vupen.com/english/advisories/2006/0539Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24626
FAQ
What is CVE-2005-3058?
CVE-2005-3058 is a vulnerability with a CVSS score of 7.5 (HIGH). Interpretation conflict in Fortinet FortiGate 2.8, running FortiOS 2.8MR10 and v3beta, allows remote attackers to bypass the URL blocker via an (1) HTTP request terminated with a line feed (LF) and no...
How severe is CVE-2005-3058?
CVE-2005-3058 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-3058?
Check the references section above for vendor advisories and patch information. Affected products include: Fortinet Fortios, Fortinet Fortigate.