
=====================================================================

                             CERT-Renater

                 Note d'Information No. 2021/VULN520
_____________________________________________________________________

DATE                : 06/10/2021

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running FortiSandbox versions prior to
3.2.3, 4.0.1.

=====================================================================
https://www.fortiguard.com/psirt/FG-IR-20-234
_____________________________________________________________________

FortiSandbox - Buffer overflow due to use of size of source buffer in
libc safe functions

IR Number    : FG-IR-20-234
Date         : Oct 5, 2021
Risk         : 3/5
CVSSv3 Score : 6.4
CVE ID       : CVE-2021-26105
Affected Products: FortiSandbox: 3.2.2, 3.1.4


Summary

A stack-based buffer overflow vulnerability (CWE-121) in the profile
parser of FortiSandbox may allow an authenticated attacker to
potentially execute unauthorized code or commands via specifically
crafted HTTP requests.


Affected Products

FortiSandbox 4.0.0.
FortiSandbox 3.2.2 and below.
FortiSandbox 3.1.4 and below.


Solutions

Upgrade to FortiSandbox 4.0.1 or above.

Upgrade to FortiSandbox 3.2.3 or above.


Acknowledgement

Internally discovered and reported by Giuseppe Cocomazzi of Fortinet
Product Security team.

=========================================================
+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=========================================================




