This CPE summary could be partial or incomplete. Please contact us for a detailed listing.
Summary
Detail | |||
---|---|---|---|
Vendor | Fortinet | First view | 2015-03-19 |
Product | Single Sign On | Last view | 2015-03-19 |
Version | Type | Application | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:a:fortinet:single_sign_on:4.3:*:*:*:*:*:*:* | 1 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.5 | 2015-03-19 | CVE-2015-2281 | Stack-based buffer overflow in collectoragent.exe in Fortinet Single Sign On (FSSO) before build 164 allows remote attackers to execute arbitrary code via a large PROCESS_HELLO message to the Message Dispatcher on TCP port 8000. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
Snort® IPS/IDS
Date | Description |
---|---|
2015-09-03 | Fortinet Single Sign On hello message denial of service attempt RuleID : 35418 - Type : SERVER-OTHER - Revision : 3 |
2015-09-03 | Fortinet Single Sign On hello message denial of service attempt RuleID : 35417 - Type : SERVER-OTHER - Revision : 3 |
2015-06-23 | Fortinet FSSO stack buffer overflow attempt RuleID : 34967 - Type : SERVER-OTHER - Revision : 2 |