ID

VAR-201705-1348


CVE

CVE-2016-8497


TITLE

FortiOS Used in Fortinet FortiClient SSL_VPN Linux Vulnerability with elevated privileges in version

Trust: 0.8

sources: JVNDB: JVNDB-2016-008605

DESCRIPTION

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none. FortiOS Used in Fortinet FortiClient SSL_VPN Linux The version contains a vulnerability that allows elevation of privilege.By the attacker, subproc Through the file root You may get permission. FortiClient SSLVPN is prone to a privilege-escalation vulnerability. An attacker can exploit this issue to gain root privileges. FortiClient SSLVPN for Linux available with FortiOS prior to 5.4.3 are vulnerable

Trust: 1.98

sources: NVD: CVE-2016-8497 // JVNDB: JVNDB-2016-008605 // BID: 97478 // VULHUB: VHN-97317

AFFECTED PRODUCTS

vendor:fortinetmodel:fortiosscope:lteversion:5.4.3

Trust: 0.8

vendor:fortinetmodel:fortiosscope:eqversion:5.4.2

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.4.1

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.2.6

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.2.5

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.2.4

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.2.3

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.2.2

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.2.1

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.13

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.8

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.7

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.3

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.2

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.1

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.7.7

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.19

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.17

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.15

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.10

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.9

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.4.0

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.2.9

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.2.10

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.6

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.5

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.4

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.12

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.11

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.0

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.18

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.16

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.14

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.13

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.12

Trust: 0.3

vendor:fortinetmodel:forticlient sslvpnscope:eqversion:0

Trust: 0.3

vendor:fortinetmodel:fortiosscope:neversion:5.4.3

Trust: 0.3

sources: BID: 97478 // JVNDB: JVNDB-2016-008605

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2016-8497
value: CRITICAL

Trust: 0.8

NVD: CVE-2016-8497
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

NVD: CVE-2016-8497
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2016-008605

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 0.8

sources: JVNDB: JVNDB-2016-008605

THREAT TYPE

network

Trust: 0.3

sources: BID: 97478

TYPE

Design Error

Trust: 0.3

sources: BID: 97478

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-008605

PATCH

title:FortiClient SSLVPN Linux - Root privilege escalation with subprocurl:https://fortiguard.com/psirt/fg-ir-16-041

Trust: 0.8

sources: JVNDB: JVNDB-2016-008605

EXTERNAL IDS

db:NVDid:CVE-2016-8497

Trust: 2.2

db:JVNDBid:JVNDB-2016-008605

Trust: 0.8

db:BIDid:97478

Trust: 0.4

db:VULHUBid:VHN-97317

Trust: 0.1

sources: VULHUB: VHN-97317 // BID: 97478 // JVNDB: JVNDB-2016-008605 // NVD: CVE-2016-8497

REFERENCES

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8497

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2016-8497

Trust: 0.8

url:http://www.fortinet.com/

Trust: 0.4

url:http://fortiguard.com/psirt/fg-ir-16-041

Trust: 0.4

sources: VULHUB: VHN-97317 // BID: 97478 // JVNDB: JVNDB-2016-008605

CREDITS

Grzegorz Wrobel

Trust: 0.3

sources: BID: 97478

SOURCES

db:VULHUBid:VHN-97317
db:BIDid:97478
db:JVNDBid:JVNDB-2016-008605
db:NVDid:CVE-2016-8497

LAST UPDATE DATE

2023-12-18T13:34:16.601000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-97317date:2017-06-27T00:00:00
db:BIDid:97478date:2017-04-11T00:03:00
db:JVNDBid:JVNDB-2016-008605date:2017-06-26T00:00:00
db:NVDid:CVE-2016-8497date:2023-11-07T02:36:15.043

SOURCES RELEASE DATE

db:VULHUBid:VHN-97317date:2017-05-27T00:00:00
db:BIDid:97478date:2017-04-05T00:00:00
db:JVNDBid:JVNDB-2016-008605date:2017-06-26T00:00:00
db:NVDid:CVE-2016-8497date:2017-05-27T00:29:00.940