-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.3340
 FortiOS & FortiProxy - Heap buffer overflow in sslvpn pre-authentication
                               13 June 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           FortiOS-6K7K
                   FortiProxy
                   FortiOS
Publisher:         Fortinet
Operating System:  Network Appliance
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-27997  

Original Bulletin: 
   https://fortiguard.fortinet.com/psirt/FG-IR-23-097

Comment: CVSS (Max):  9.2 CVE-2023-27997 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: Fortinet
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

FortiOS & FortiProxy - Heap buffer overflow in sslvpn pre-authentication

IR Number    : FG-IR-23-097
Date         : Jun 12, 2023
Severity     : Critical
CVSSv3 Score : 9.2
Impact       : Execute unauthorized code or commands
CVE ID       : CVE-2023-27997
Affected Products:

FortiOS-6K7K: 7.0.5, 7.0.10, 6.4.8, 6.4.6, 6.4.2, 6.4.12, 6.4.10, 6.2.9, 6.2.7,
              6.2.6, 6.2.4, 6.2.13, 6.2.12, 6.2.11, 6.2.10, 6.0.16, 6.0.15, 6.0.14,
              6.0.13, 6.0.12, 6.0.10


FortiProxy: 7.2.3, 7.2.2, 7.2.1, 7.2.0, 7.0.9, 7.0.8, 7.0.7, 7.0.6, 7.0.5, 7.0.4,
            7.0.3, 7.0.2, 7.0.1, 7.0.0, 2.0.9, 2.0.8, 2.0.7, 2.0.6, 2.0.5, 2.0.4,
            2.0.3, 2.0.2, 2.0.12, 2.0.11, 2.0.10, 2.0.1, 2.0.0, 1.2.9, 1.2.8, 1.2.7,
            1.2.6, 1.2.5, 1.2.4, 1.2.3, 1.2.2, 1.2.13, 1.2.12, 1.2.11, 1.2.10, 1.2.1,
            1.2.0, 1.1.6, 1.1.5, 1.1.4, 1.1.3, 1.1.2, 1.1.1, 1.1.0


FortiOS: 7.2.4, 7.2.3, 7.2.2, 7.2.1, 7.2.0, 7.0.9, 7.0.8, 7.0.7, 7.0.6, 7.0.5, 7.0.4,
         7.0.3, 7.0.2, 7.0.11, 7.0.10, 7.0.1, 7.0.0, 6.4.9, 6.4.8, 6.4.7, 6.4.6, 6.4.5,
         6.4.4, 6.4.3, 6.4.2, 6.4.12, 6.4.11, 6.4.10, 6.4.1, 6.4.0, 6.0.9, 6.0.8, 6.0.7,
         6.0.6, 6.0.5, 6.0.4, 6.0.3, 6.0.2, 6.0.16, 6.0.15, 6.0.14, 6.0.13, 6.0.12, 6.0.11,
         6.0.10, 6.0.1, 6.0.0

Summary

A heap-based buffer overflow vulnerability [CWE-122] in FortiOS and FortiProxy
SSL-VPN may allow a remote attacker to execute arbitrary code or commands via
specifically crafted requests.

Affected Products

At least
FortiOS-6K7K version 7.0.10
FortiOS-6K7K version 7.0.5
FortiOS-6K7K version 6.4.12
FortiOS-6K7K version 6.4.10
FortiOS-6K7K version 6.4.8
FortiOS-6K7K version 6.4.6
FortiOS-6K7K version 6.4.2
FortiOS-6K7K version 6.2.9 through 6.2.13
FortiOS-6K7K version 6.2.6 through 6.2.7
FortiOS-6K7K version 6.2.4
FortiOS-6K7K version 6.0.12 through 6.0.16
FortiOS-6K7K version 6.0.10
At least
FortiProxy version 7.2.0 through 7.2.3
FortiProxy version 7.0.0 through 7.0.9
FortiProxy version 2.0.0 through 2.0.12
FortiProxy 1.2 all versions
FortiProxy 1.1 all versions
At least
FortiOS version 7.2.0 through 7.2.4
FortiOS version 7.0.0 through 7.0.11
FortiOS version 6.4.0 through 6.4.12
FortiOS version 6.0.0 through 6.0.16

Solutions

Please upgrade to FortiOS-6K7K version 7.0.12 or above
Please upgrade to FortiOS-6K7K version 6.4.13 or above
Please upgrade to FortiOS-6K7K version 6.2.15 or above
Please upgrade to FortiOS-6K7K version 6.0.17 or above
Please upgrade to FortiProxy version 7.2.4 or above
Please upgrade to FortiProxy version 7.0.10 or above
Please upgrade to FortiProxy version 2.0.13 or above
Please upgrade to FortiOS version 7.4.0 or above
Please upgrade to FortiOS version 7.2.5 or above
Please upgrade to FortiOS version 7.0.12 or above
Please upgrade to FortiOS version 6.4.13 or above
Please upgrade to FortiOS version 6.2.14 or above
Please upgrade to FortiOS version 6.0.17 or above

Acknowledgement

Fortinet is pleased to thank Charles Fol and Dany Bach from LEXFO for bringing
this issue to our attention under responsible disclosure.

Timeline

2023-06-12: Initial publication

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/

iQIVAwUBZIf7TckNZI30y1K9AQhuBxAAnCjJUY4UI0KTmJfTvhyTwJmc1YihNwTM
hNrox0/hCzwDpl17t5JYHqmiTnoJuOEAIIqW0JwDyjh9zPwc5LQIMIunOqDRRlg8
f3qoUW+vU++pFjanwEXYj9bW61uAP4x6S4fAbppVHvvjYTE7Fq1jHFzuu7X3vJeR
yVZ/GG2fyfJ6XM0yNYgIzxjz48aTQYyEDL6zRlgoRlaorLgw3DmxMLJz5hXR+IO7
hcYt3k4z3PzTVpbKaO2201NPtnE5RBsBvaUpK/vBQ47dBBEjbMmsMH+zpqzuO4fN
lz/5N0jd+WprSlsvyVvQ0j6GpIpQTwUSY52jwO+gb0qxN+5vESXKylLhfQX+G/gq
hfu3jRFUxwUJYz/CBNkNVbADOvx0Hmb/ezCg9IWpQkTyJa5enspSBAEDb/Oje4lx
jtQ3BhxGQoeb2S+kSYLluJbl8zoVT51rybNxReWD+GYfVkBCKNdTTGgwMTAGN5dN
YNg3o/gzVMKPsXOW8LRrONLcVO568G6g4BA4ZA+j97+sBNnMBwlbBxtg/CK7y7ZS
YhsYrbVF2lYrU4xC3ogRR7A3sOtp94keQLXgvq6qRHLfiMv5x+/U8VOTmp1Gdedp
YyCPo5dJ664W58xhFtVLINtvpMGPSLYNEZcU1Op4YQT3exHhAw76KALgrsa8B7rZ
MMt4zOMnnrQ=
=Cdf2
-----END PGP SIGNATURE-----