Fortinet FortiOS 5.0.x < 5.0.2 Multiple Vulnerabilities

high Nessus Plugin ID 85741

Synopsis

The remote host is affected by multiple vulnerabilities.

Description

The remote host is running a version of Fortinet FortiOS 5.0.x prior to 5.0.2. It is, therefore, affected by the following vulnerabilities :

- A security bypass vulnerability exists due to a flaw when using SMTP. An unauthenticated, remote attacker can exploit this to bypass the DLP full content archive.

- An unspecified flaw exists in the SSL renegotiation functionality that an unauthenticated, remote attacker can exploit to cause a denial of service condition.

Solution

Upgrade to Fortinet FortiOS 5.0.2 or later.

See Also

http://www.nessus.org/u?b8916821

Plugin Details

Severity: High

ID: 85741

File Name: fortios_smtp_ssl_multi_vuln.nasl

Version: 1.7

Type: local

Family: Firewalls

Published: 9/2/2015

Updated: 1/2/2019

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/o:fortinet:fortios

Required KB Items: Host/Fortigate/model, Host/Fortigate/version, Host/Fortigate/build

Patch Publication Date: 3/18/2013

Vulnerability Publication Date: 3/18/2013