Vulnerability Description
A Stack-based Buffer Overflow vulnerability in the HTTPD daemon of FortiOS 6.0.10 and below, 6.2.2 and below and FortiProxy 1.0.x, 1.1.x, 1.2.9 and below, 2.0.0 and below may allow an authenticated remote attacker to crash the service by sending a malformed PUT request to the server. Fortinet is not aware of any successful exploitation of this vulnerability that would lead to code execution.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fortinet | Fortiproxy | >= 1.0.0, < 1.2.10 |
| Fortinet | Fortios | <= 6.0.10 |
Related Weaknesses (CWE)
References
- https://fortiguard.com/advisory/FG-IR-19-248Vendor Advisory
- https://fortiguard.com/advisory/FG-IR-21-007Vendor Advisory
- https://fortiguard.com/advisory/FG-IR-19-248Vendor Advisory
- https://fortiguard.com/advisory/FG-IR-21-007Vendor Advisory
FAQ
What is CVE-2019-17656?
CVE-2019-17656 is a vulnerability with a CVSS score of 5.4 (MEDIUM). A Stack-based Buffer Overflow vulnerability in the HTTPD daemon of FortiOS 6.0.10 and below, 6.2.2 and below and FortiProxy 1.0.x, 1.1.x, 1.2.9 and below, 2.0.0 and below may allow an authenticated re...
How severe is CVE-2019-17656?
CVE-2019-17656 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-17656?
Check the references section above for vendor advisories and patch information. Affected products include: Fortinet Fortiproxy, Fortinet Fortios.