CVE-2021-22129Classic Buffer Overflow in Fortinet Fortimail

Severity
8.8HIGHNVD
EPSS
0.5%
top 36.25%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 9
Latest updateMay 24

Description

Multiple instances of incorrect calculation of buffer size in the Webmail and Administrative interface of FortiMail before 6.4.5 may allow an authenticated attacker with regular webmail access to trigger a buffer overflow and to possibly execute unauthorized code or commands via specifically crafted HTTP requests.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

NVDfortinet/fortimail5.6.16.0.11+3
CVEListV5fortinet/fortinet_fortimailFortiMail before 6.4.5

🔴Vulnerability Details

2
GHSA
GHSA-4466-79c6-7gv2: Multiple instances of incorrect calculation of buffer size in the Webmail and Administrative interface of FortiMail before 62022-05-24
CVEList
CVE-2021-22129: Multiple instances of incorrect calculation of buffer size in the Webmail and Administrative interface of FortiMail before 62021-07-09

📋Vendor Advisories

1
Fortinet
Multiple instances of incorrect calculation of buffer size in the Webmail and Administrative interface of FortiMail befo...2021-07-09
CVE-2021-22129 — Classic Buffer Overflow in Fortinet | cvebase