Resolved issues
The following issues have been fixed in FortiProxy 7.2.13. For inquiries about a particular bug, please contact Customer Service & Support.
|
Bug ID |
Description |
|---|---|
|
1095945 |
Cannot reset one of the scanunit debugs, which permanently floods the CLI with output. |
| 1093060 | Format string vulnerability in certificate import. |
| 1043602, 1091669 | Error when creating HA with ha-mgmt interface. |
| 1092960 | Format string vulnerability in FortiToken import. |
| 1018780, 1023127 | WAD crash on wad_http_avscan_comfort. |
| 1088776 | Digest auth crash. |
| 1088412 | No URL in the auth failed event log. |
| 1087203, 1088519 | WAD blocks botnet after connection instead of before connection. |
| 1001079 | Memory leak. |
| 1022667,1086628 | FTP fails to transfer file when preview is enabled in ICAP profile. |
| 983997, 1099574 | Failed to validate two different CAs with the same subject and issuer. |
| 1096728 | Continuous WAD crashing on Azure which affects some VIP traffic. |
|
1101390 |
Proxy-address host address config update does not take effect. |
|
1096290 |
WAD crash at wad_log_http_transaction. |
|
1070388 |
FortiProxy does not respond to an ICMP request from directly connected interfaces. |
|
1097384 |
FortiProxy SOCKS policy-matching is case-sensitive while case-sensitivity is disabled globally. |
|
1083925 |
When captive portal is set to FQDN, it fails to match due to FQDN case sensitivity. |
|
1082378 |
The counter of bytes shows 0 after SOCKS traffic matched the policy. |
|
1093606 |
Buffer overflow. |
Common vulnerabilities and exposures
FortiProxy 7.2.13 is no longer vulnerable to the following CVE references. Visit https://fortiguard.com/psirt for more information.
|
Bug ID |
CVE reference |
|---|---|
|
1108891 |
|
|
1092960, 1093060 |