Vulnerability Description
The Fortishield.sys driver in Fortinet FortiClient before 5.2.4 allows local users to execute arbitrary code with kernel privileges by setting the callback function in a (1) 0x220024 or (2) 0x220028 ioctl call.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fortinet | Forticlient | <= 5.2.3 |
Related Weaknesses (CWE)
References
- http://fortiguard.com/advisory/mulitple-vulnerabilities-in-forticlient
- http://packetstormsecurity.com/files/133398/FortiClient-Antivirus-Information-Ex
- http://seclists.org/fulldisclosure/2015/Sep/0
- http://www.coresecurity.com/advisories/forticlient-antivirus-multiple-vulnerabil
- http://www.fortiguard.com/advisory/mulitple-vulnerabilities-in-forticlientVendor Advisory
- http://www.securityfocus.com/archive/1/536369/100/0/threaded
- http://www.securitytracker.com/id/1033439
- https://www.exploit-db.com/exploits/41721/
- https://www.exploit-db.com/exploits/41722/
- https://www.exploit-db.com/exploits/45149/
- http://fortiguard.com/advisory/mulitple-vulnerabilities-in-forticlient
- http://packetstormsecurity.com/files/133398/FortiClient-Antivirus-Information-Ex
- http://seclists.org/fulldisclosure/2015/Sep/0
- http://www.coresecurity.com/advisories/forticlient-antivirus-multiple-vulnerabil
- http://www.fortiguard.com/advisory/mulitple-vulnerabilities-in-forticlientVendor Advisory
FAQ
What is CVE-2015-5736?
CVE-2015-5736 is a vulnerability with a CVSS score of 7.2 (HIGH). The Fortishield.sys driver in Fortinet FortiClient before 5.2.4 allows local users to execute arbitrary code with kernel privileges by setting the callback function in a (1) 0x220024 or (2) 0x220028 i...
How severe is CVE-2015-5736?
CVE-2015-5736 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-5736?
Check the references section above for vendor advisories and patch information. Affected products include: Fortinet Forticlient.