Vulnerability CVE-2015-5737


Published: 2015-09-03

Description:
The (1) mdare64_48.sys, (2) mdare32_48.sys, (3) mdare32_52.sys, (4) mdare64_52.sys, and (5) Fortishield.sys drivers in Fortinet FortiClient before 5.2.4 do not properly restrict access to the API for management of processes and the Windows registry, which allows local users to obtain a privileged handle to a PID and possibly have unspecified other impact, as demonstrated by a 0x2220c8 ioctl call.

See advisories in our WLB2 database:
Topic
Author
Date
High
FortiClient Antivirus Information Exposure / Access Control
CORE
02.09.2015

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.2/10
10/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Fortinet -> Forticlient 

 References:
http://fortiguard.com/advisory/mulitple-vulnerabilities-in-forticlient
http://packetstormsecurity.com/files/133398/FortiClient-Antivirus-Information-Exposure-Access-Control.html
http://seclists.org/fulldisclosure/2015/Sep/0
http://www.coresecurity.com/advisories/forticlient-antivirus-multiple-vulnerabilities
http://www.fortiguard.com/advisory/mulitple-vulnerabilities-in-forticlient
http://www.securityfocus.com/archive/1/536369/100/0/threaded
http://www.securitytracker.com/id/1033439

Copyright 2024, cxsecurity.com

 

Back to Top