Description
A buffer copy without checking size of input ('classic buffer overflow') in Fortinet FortiMail webmail and administrative interface version 6.4.0 through 6.4.4 and before 6.2.6 and FortiNDR administrative interface version 7.2.0 and before 7.1.0 allows an authenticated attacker with regular webmail access to trigger a buffer overflow and to possibly execute unauthorized code or commands via specifically crafted HTTP requests.
INFO
Published Date :
2025-03-31T14:58:11.960Z
Last Modified :
2025-03-31T15:30:12.990Z
Source :
fortinet
AFFECTED PRODUCTS
The following products are affected by CVE-2023-33302 vulnerability.
| Vendors | Products |
|---|---|
| Fortinet |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2023-33302.
| URL | Resource |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-21-023 |
|
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact