ID

VAR-201503-0199


CVE

CVE-2015-2281


TITLE

Fortinet Single Sign On of collectoragent.exe Vulnerable to stack-based buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2015-001892

DESCRIPTION

Stack-based buffer overflow in collectoragent.exe in Fortinet Single Sign On (FSSO) before build 164 allows remote attackers to execute arbitrary code via a large PROCESS_HELLO message to the Message Dispatcher on TCP port 8000. Multiple Fortinet products are prone to a stack-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. A remote attacker may exploit this issue to execute arbitrary code in the context of the affected application. Failed attempts will likely cause a denial-of-service condition. This may also lead to a full network compromise. Fortinet Single Sign On (FSSO) is a single sign-on solution from Fortinet. A stack-based buffer overflow vulnerability exists in the collectoragent.exe file of versions prior to FSSO build 164

Trust: 1.98

sources: NVD: CVE-2015-2281 // JVNDB: JVNDB-2015-001892 // BID: 73206 // VULHUB: VHN-80242

AFFECTED PRODUCTS

vendor:fortinetmodel:single sign onscope:eqversion:4.3

Trust: 1.6

vendor:fortinetmodel:single sign onscope:ltversion:build 237

Trust: 0.8

sources: JVNDB: JVNDB-2015-001892 // CNNVD: CNNVD-201503-389 // NVD: CVE-2015-2281

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-2281
value: HIGH

Trust: 1.0

NVD: CVE-2015-2281
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201503-389
value: HIGH

Trust: 0.6

VULHUB: VHN-80242
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-2281
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-80242
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-80242 // JVNDB: JVNDB-2015-001892 // CNNVD: CNNVD-201503-389 // NVD: CVE-2015-2281

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-80242 // JVNDB: JVNDB-2015-001892 // NVD: CVE-2015-2281

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201503-389

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201503-389

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-001892

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-80242

PATCH

title:FSSO stack-based buffer overflowurl:http://www.fortiguard.com/advisory/FG-IR-15-006/

Trust: 0.8

sources: JVNDB: JVNDB-2015-001892

EXTERNAL IDS

db:NVDid:CVE-2015-2281

Trust: 2.8

db:BIDid:73206

Trust: 1.4

db:OSVDBid:119719

Trust: 1.1

db:EXPLOIT-DBid:36422

Trust: 1.1

db:JVNDBid:JVNDB-2015-001892

Trust: 0.8

db:CNNVDid:CNNVD-201503-389

Trust: 0.7

db:PACKETSTORMid:130904

Trust: 0.1

db:VULHUBid:VHN-80242

Trust: 0.1

sources: VULHUB: VHN-80242 // BID: 73206 // JVNDB: JVNDB-2015-001892 // CNNVD: CNNVD-201503-389 // NVD: CVE-2015-2281

REFERENCES

url:http://www.coresecurity.com/advisories/fortinet-single-sign-on-stack-overflow

Trust: 2.5

url:http://www.fortiguard.com/advisory/fg-ir-15-006/

Trust: 1.7

url:http://seclists.org/fulldisclosure/2015/mar/111

Trust: 1.7

url:http://www.securityfocus.com/bid/73206

Trust: 1.1

url:http://www.securityfocus.com/archive/1/534918/100/0/threaded

Trust: 1.1

url:http://www.fortiguard.com/advisory/2015-02-27-fsso-stack-based-buffer-overflow

Trust: 1.1

url:https://www.exploit-db.com/exploits/36422/

Trust: 1.1

url:http://www.osvdb.org/119719

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2281

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-2281

Trust: 0.8

url:http://www.fortinet.com/

Trust: 0.3

sources: VULHUB: VHN-80242 // BID: 73206 // JVNDB: JVNDB-2015-001892 // CNNVD: CNNVD-201503-389 // NVD: CVE-2015-2281

CREDITS

Enrique Nissim and Andres Lopez Luksenberg from the Core Security Exploit Writing Team.

Trust: 0.3

sources: BID: 73206

SOURCES

db:VULHUBid:VHN-80242
db:BIDid:73206
db:JVNDBid:JVNDB-2015-001892
db:CNNVDid:CNNVD-201503-389
db:NVDid:CVE-2015-2281

LAST UPDATE DATE

2025-04-13T23:26:46.734000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-80242date:2018-10-09T00:00:00
db:BIDid:73206date:2015-07-15T00:14:00
db:JVNDBid:JVNDB-2015-001892date:2015-03-24T00:00:00
db:CNNVDid:CNNVD-201503-389date:2015-03-20T00:00:00
db:NVDid:CVE-2015-2281date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-80242date:2015-03-19T00:00:00
db:BIDid:73206date:2015-03-18T00:00:00
db:JVNDBid:JVNDB-2015-001892date:2015-03-24T00:00:00
db:CNNVDid:CNNVD-201503-389date:2015-03-20T00:00:00
db:NVDid:CVE-2015-2281date:2015-03-19T14:59:00.070