This script is Copyright (C) 2011-2015 Tenable Network Security, Inc.
The remote Windows host contains a security application that is
affected by a local format string vulnerability.
FortiClient, a client-based software solution intended to provide
security features for enterprise computers and mobile devices, is
installed on the remote Windows host.
The installed version does not properly handle format string
specifiers within a VPN connection name. A local user may be able to
leverage this issue to read and write arbitrary memory with SYSTEM
See also :
Upgrade to Fortinet FortiClient 3.0 MR7 Patch 6 (3.0.616) or later.
Risk factor :
High / CVSS Base Score : 7.2
CVSS Temporal Score : 5.6
Public Exploit Available : true