Fortinet black logo

Resolved issues

Resolved issues

The following issues have been resolved in the FortiDDoS-F 6.4.0 release. For inquiries about particular bugs, please contact Fortinet Customer Service & Support.

Bug ID

Description

0810242 Resetting an SPP configuration to default, from the Service Protection > Service Protection Policy List may not reset UDP Service Ports.
0748881 TACACS+ authentication was not working for GUI logins.
0784660 If Service Protection Policy or SSL/TLS Profile used System > Address policies, the SPP Policy or SSL/TLS Profile could not be deleted until the address objects were removed.
0826613 Other Protocol Fragment Attack Log may show "Associated Port" as 65535 which is incorrect. No port information is available in most Layer 3 fragments.
0826801 TCP Zombie Flood Attack Log may show "Associated Port" as 65535 which is incorrect. There should be no port information.
0826404 Destination Flood Attack Log may show "Associated Port" as 65535 which is incorrect. There should be no port information.
0827061 Protocol Flood Attack Log may show "Associated Port" as 65535 which is incorrect. There should be no port information.
0815486 Attack logs for attack log events such as SYN/Src, SYN/Dst, Source Flood and Destination Flood, shows associated port = 0, which can be misleading. Instead, it should show "-" for these events.
0835326 When a patch file is installed, it cannot be uninstalled. Installing a patch file is a very rare occurrence, managed by the FortiDDoS dev team, so will be low impact.
0785818 Debug File, Attack Log CSV has some logs incorrectly formatted resulting in misaligned columns and some missing information.
0801906 DNS Profile, DNS Fragment option does not properly drop IPv6 DNS fragments.
0812129 If enough reports are generated to require multiple pages, the page selection buttons may not work.
0833086

Some tables may be missed in generated reports if the system has a large number of data and too many tables are requested.

0806800 Most Active Source and Most Active Destination Traffic Statistics and graphs were not accurate, erring too high compared to actual traffic.
0764676 Command formatlogdisk from the console does not show any output — only seen in (SSH) CLI.
0796137

On some graphs, when no drop count has been shown for a long time and then drops occur, the system would write the graph backwards to the previous event, showing drops continuously when none actually happened (even when the logs are correct).

0812252 FDD-200F CLI get system sensors was not working.
0807382 After DST or Time Zone setting changed, get system status may still show the old time/zone.
0806420 After upgrade of KVM VM, it could take 10 minutes to update RRDs.
0695645 Under rare conditions, generating multiple Certificates after a restore can stop the GUI.

0804753

If SPP Layer 3 Thresholds are set to factory default via CLI, the Most Active Destination Threshold would not reset.

Common Vulnerabilities and Exposures

For more information, visit https://www.fortiguard.com/psirt.

Bug ID

Description

0776398 FortiDDoS-F 6.4.0 is no longer vulnerable to the following CVE-Reference: CWE-269.

Resolved issues

The following issues have been resolved in the FortiDDoS-F 6.4.0 release. For inquiries about particular bugs, please contact Fortinet Customer Service & Support.

Bug ID

Description

0810242 Resetting an SPP configuration to default, from the Service Protection > Service Protection Policy List may not reset UDP Service Ports.
0748881 TACACS+ authentication was not working for GUI logins.
0784660 If Service Protection Policy or SSL/TLS Profile used System > Address policies, the SPP Policy or SSL/TLS Profile could not be deleted until the address objects were removed.
0826613 Other Protocol Fragment Attack Log may show "Associated Port" as 65535 which is incorrect. No port information is available in most Layer 3 fragments.
0826801 TCP Zombie Flood Attack Log may show "Associated Port" as 65535 which is incorrect. There should be no port information.
0826404 Destination Flood Attack Log may show "Associated Port" as 65535 which is incorrect. There should be no port information.
0827061 Protocol Flood Attack Log may show "Associated Port" as 65535 which is incorrect. There should be no port information.
0815486 Attack logs for attack log events such as SYN/Src, SYN/Dst, Source Flood and Destination Flood, shows associated port = 0, which can be misleading. Instead, it should show "-" for these events.
0835326 When a patch file is installed, it cannot be uninstalled. Installing a patch file is a very rare occurrence, managed by the FortiDDoS dev team, so will be low impact.
0785818 Debug File, Attack Log CSV has some logs incorrectly formatted resulting in misaligned columns and some missing information.
0801906 DNS Profile, DNS Fragment option does not properly drop IPv6 DNS fragments.
0812129 If enough reports are generated to require multiple pages, the page selection buttons may not work.
0833086

Some tables may be missed in generated reports if the system has a large number of data and too many tables are requested.

0806800 Most Active Source and Most Active Destination Traffic Statistics and graphs were not accurate, erring too high compared to actual traffic.
0764676 Command formatlogdisk from the console does not show any output — only seen in (SSH) CLI.
0796137

On some graphs, when no drop count has been shown for a long time and then drops occur, the system would write the graph backwards to the previous event, showing drops continuously when none actually happened (even when the logs are correct).

0812252 FDD-200F CLI get system sensors was not working.
0807382 After DST or Time Zone setting changed, get system status may still show the old time/zone.
0806420 After upgrade of KVM VM, it could take 10 minutes to update RRDs.
0695645 Under rare conditions, generating multiple Certificates after a restore can stop the GUI.

0804753

If SPP Layer 3 Thresholds are set to factory default via CLI, the Most Active Destination Threshold would not reset.

Common Vulnerabilities and Exposures

For more information, visit https://www.fortiguard.com/psirt.

Bug ID

Description

0776398 FortiDDoS-F 6.4.0 is no longer vulnerable to the following CVE-Reference: CWE-269.