Vulnerability Description
Fortinet FortiClient Linux SSLVPN before build 2313, when installed on Linux in a home directory that is world readable and executable, allows local users to gain privileges via the helper/subroc setuid program.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fortinet | Forticlient | All versions |
Related Weaknesses (CWE)
References
- http://fortiguard.com/advisory/forticlient-sslvpn-linux-client-local-privilege-e
- http://www.fortiguard.com/advisory/forticlient-sslvpn-linux-client-local-privileVendor Advisory
- http://fortiguard.com/advisory/forticlient-sslvpn-linux-client-local-privilege-e
- http://www.fortiguard.com/advisory/forticlient-sslvpn-linux-client-local-privileVendor Advisory
FAQ
What is CVE-2015-7362?
CVE-2015-7362 is a vulnerability with a CVSS score of 7.8 (HIGH). Fortinet FortiClient Linux SSLVPN before build 2313, when installed on Linux in a home directory that is world readable and executable, allows local users to gain privileges via the helper/subroc setu...
How severe is CVE-2015-7362?
CVE-2015-7362 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-7362?
Check the references section above for vendor advisories and patch information. Affected products include: Fortinet Forticlient.