AT2k Design BBS Message Area
Casually read the BBS message area using an easy to use interface. Messages are categorized exactly like they are on the BBS. You may post new messages or reply to existing messages!

You are not logged in. Login here for full access privileges.

Previous Message | Next Message | Back to Computer Support/Help/Discussion...  <--  <--- Return to Home Page
   Networked Database  Computer Support/Help/Discussion...   [566 / 1585] RSS
 From   To   Subject   Date/Time 
Message   Sean Dennis    All   Fortinet remote code   July 20, 2021
 11:42 PM *  

(This isn't good.  I used to work a lot with Fortinet devices.)

From: https://www.theregister.com/2021/07/20/fortin...

===
   Fortinet's security appliances hit by remote code execution vulnerability

   Cure worse than the disease for anyone with the 'fgfmsd' daemon 
   activated

   Gareth Halfacree Tue 20 Jul 2021 // 14:30 UTC

     ----------------------------------------------------------------------

   Security appliance slinger Fortinet has warned of a critical vulnerability
   in its software that can be exploited to grant unauthenticated attackers
   full control over a targeted system, providing a particular daemon is
   enabled.

   The flaw, discovered by Orange Group security researcher Cyrille Chatras
   and sent to Fortinet privately for responsible disclosure, lies in
   FortiManager and FortiAnalyzer's fgfmsd daemon, which if running and
   vulnerable can be exploited over the network.

   "A Use After Free (CWE-416) vulnerability in [the] FortiManager and
   FortiAnalyzer fgfmsd daemon may allow a remote, non-authenticated attacker
   to execute unauthorised code as root via sending a specifically crafted
   request to the FGFM port of the targeted device," the vendor warned
   customers.

   Note that the FGFM service is disabled by default in FortiAnalyzer and can
   only be enabled on 1000E, 2000E, 3000D, 3000E, 3000F, 3500E, 3500F, 3700F,
   and 3900E appliances.

   Those with affected FortiManager and FortiAnalyzer installations are
   advised to upgrade to the most recently released version - 5.6.11, 6.0.11,
   6.2.8, 6.4.6, or 7.0.1 or above, depending on which major release of the
   software you're running - to close the hole.

   Should that be impossible, and you're using a FortiAnalyzer box, a
   workaround is to disable the FortiManager features on the FortiAnalyzer
   unit manually with the following commands at the management console:

   config system global 
   set fmg-status disable
   end

   "Memory related vulnerabilities are a common problem which can often have
   severe impact, such as is the case here," application security expert Sean
   Wright told The Register. "Ensuring appropriate checks are performed to
   identify these flaws is crucial, for example by using static code scanners
   which will detect and prevent their presence.

   "Alternatively, educating developers about their existence early in the
   development cycle will ensure code is built securely and without such
   flaws in the first place. A more drastic approach, which is not always
   possible, is to move to a language which performs automatic memory
   management, such as Go or Java."

   The vulnerability is the biggest to hit Fortinet products since October
   last year, when the US Department of Homeland Security's Cybersecurity and
   Infrastructure Security Agency (CISA) warned that flaws in the FortiOS SSL
   virtual private network (VPN) had been used to gain access to supposedly
   private networks in "multiple cases."

   More information is available in the FortiGuard Labs security bulletin.
   Fortinet did not respond to a request for additional comment by the time
   of publication. (R)
===

-- Sean

... Government should spend our money like it was their own.
___ MultiMail/Win v0.52

--- Maximus/2 3.01
 * Origin: Outpost BBS // bbs.outpostbbs.net:10123 (618:618/10)
  Show ANSI Codes | Hide BBCodes | Show Color Codes | Hide Encoding | Hide HTML Tags | Show Routing
Previous Message | Next Message | Back to Computer Support/Help/Discussion...  <--  <--- Return to Home Page

VADV-PHP
Execution Time: 0.0151 seconds

If you experience any problems with this website or need help, contact the webmaster.
VADV-PHP Copyright © 2002-2024 Steve Winn, Aspect Technologies. All Rights Reserved.
Virtual Advanced Copyright © 1995-1997 Roland De Graaf.
v2.1.220106