Fortinet Single Sign On Windows AD Buffer Overflow Exploit

There is a vulnerability in the message dispatcher used by FSSO Windows Active Directory and FSSO Novell eDirectory The software installs a service which by default listens on port 8000 TCP. By sending a specially crafted packet it is possible to trigger a stack based buffer overflow which allows execution of arbitrary code with the privileges of the FSSO user, which is generally a Windows AD domain user
Exploit Platform
Exploit Type
Product Name