Fortinet white logo
Fortinet white logo

Resolved issues

Resolved issues

The following issues have been fixed in FortiProxy 7.2.13. For inquiries about a particular bug, please contact Customer Service & Support.

Bug ID

Description

1095945

Cannot reset one of the scanunit debugs, which permanently floods the CLI with output.

1093060 Format string vulnerability in certificate import.
1043602, 1091669 Error when creating HA with ha-mgmt interface.
1092960 Format string vulnerability in FortiToken import.
1018780, 1023127 WAD crash on wad_http_avscan_comfort.
1088776 Digest auth crash.
1088412 No URL in the auth failed event log.
1087203, 1088519 WAD blocks botnet after connection instead of before connection.
1001079 Memory leak.
1022667,1086628 FTP fails to transfer file when preview is enabled in ICAP profile.
983997, 1099574 Failed to validate two different CAs with the same subject and issuer.
1096728 Continuous WAD crashing on Azure which affects some VIP traffic.

1101390

Proxy-address host address config update does not take effect.

1096290

WAD crash at wad_log_http_transaction.

1070388

FortiProxy does not respond to an ICMP request from directly connected interfaces.

1097384

FortiProxy SOCKS policy-matching is case-sensitive while case-sensitivity is disabled globally.

1083925

When captive portal is set to FQDN, it fails to match due to FQDN case sensitivity.

1082378

The counter of bytes shows 0 after SOCKS traffic matched the policy.

1093606

Buffer overflow.

Common vulnerabilities and exposures

FortiProxy 7.2.13 is no longer vulnerable to the following CVE references. Visit https://fortiguard.com/psirt for more information.

Bug ID

CVE reference

1108891

CVE-2024-55591

1092960, 1093060

CVE-2024-45324

Resolved issues

Resolved issues

The following issues have been fixed in FortiProxy 7.2.13. For inquiries about a particular bug, please contact Customer Service & Support.

Bug ID

Description

1095945

Cannot reset one of the scanunit debugs, which permanently floods the CLI with output.

1093060 Format string vulnerability in certificate import.
1043602, 1091669 Error when creating HA with ha-mgmt interface.
1092960 Format string vulnerability in FortiToken import.
1018780, 1023127 WAD crash on wad_http_avscan_comfort.
1088776 Digest auth crash.
1088412 No URL in the auth failed event log.
1087203, 1088519 WAD blocks botnet after connection instead of before connection.
1001079 Memory leak.
1022667,1086628 FTP fails to transfer file when preview is enabled in ICAP profile.
983997, 1099574 Failed to validate two different CAs with the same subject and issuer.
1096728 Continuous WAD crashing on Azure which affects some VIP traffic.

1101390

Proxy-address host address config update does not take effect.

1096290

WAD crash at wad_log_http_transaction.

1070388

FortiProxy does not respond to an ICMP request from directly connected interfaces.

1097384

FortiProxy SOCKS policy-matching is case-sensitive while case-sensitivity is disabled globally.

1083925

When captive portal is set to FQDN, it fails to match due to FQDN case sensitivity.

1082378

The counter of bytes shows 0 after SOCKS traffic matched the policy.

1093606

Buffer overflow.

Common vulnerabilities and exposures

FortiProxy 7.2.13 is no longer vulnerable to the following CVE references. Visit https://fortiguard.com/psirt for more information.

Bug ID

CVE reference

1108891

CVE-2024-55591

1092960, 1093060

CVE-2024-45324