Fortinet Document Library

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:


Table of Contents

Resolved issues

The resolved issues listed below do not list every bug that has been corrected with this release. For inquires about a particular bug, please contact Fortinet Customer Service & Support.

Profiles

Bug ID

Description

579873 Messages from non-zero day IP are incorrectly delayed in spam outbreak queue.
578380 Email content was garbled after inserting disclaimer at start of message with antispam profile action or content profile action.
570751 CDR (URL Protection) removes spaces between the lines and email is received as text.

Mail receival and delivery

Bug ID

Description

585078 In some cases, FortiMail is unable to parse URLs in email body.
577630 Address mapping does not work when disclaimer is enabled.
587366 Some SMTP server cannot receive released CDR email from FortiMail due to duplicated message IDs.
586109 Email is not delivered when sending out invitations from join.me.

System

Bug ID

Description

537335 Having “Reject different SMTP sender identity” enabled does not check the domain part when the FROM is a protected domain.
586345 Inserting Disclaimer into certain email causes large swap files.
580480 Administrators should not be allowed to log in with HTTP GET method.
579574 New IBE users are unable to register.
587729 Traffic capture duration does not work properly.
579253 Read only admin profiles have Read-Write privileges.
579414 IBE users are greeted by the SSO page after logon.
578985 Not able to configure high range port numbers in LDAP profiles.

Admin GUI and webmail

Bug ID

Description

584428 History log disposition field has wrong "Insert Disclaimer" message.
576017 Admin GUI has issue with displaying history log.

Common vulnerabilites and exposures

Visit https://fortiguard.com/psirt for more information.

Bug ID Description
(No bug ID)

FortiMail 6.2.1 is no longer vulnerable to the following CVE-Reference:

  • CVE-2019-10092
  • CVE-2019-10098
  • CVE-2019-10082
  • CVE-2019-10081
  • CVE-2019-9517
  • CVE-2019-10097
  • CVE-2019-15707
  • CVE-2019-15712

Resolved issues

The resolved issues listed below do not list every bug that has been corrected with this release. For inquires about a particular bug, please contact Fortinet Customer Service & Support.

Profiles

Bug ID

Description

579873 Messages from non-zero day IP are incorrectly delayed in spam outbreak queue.
578380 Email content was garbled after inserting disclaimer at start of message with antispam profile action or content profile action.
570751 CDR (URL Protection) removes spaces between the lines and email is received as text.

Mail receival and delivery

Bug ID

Description

585078 In some cases, FortiMail is unable to parse URLs in email body.
577630 Address mapping does not work when disclaimer is enabled.
587366 Some SMTP server cannot receive released CDR email from FortiMail due to duplicated message IDs.
586109 Email is not delivered when sending out invitations from join.me.

System

Bug ID

Description

537335 Having “Reject different SMTP sender identity” enabled does not check the domain part when the FROM is a protected domain.
586345 Inserting Disclaimer into certain email causes large swap files.
580480 Administrators should not be allowed to log in with HTTP GET method.
579574 New IBE users are unable to register.
587729 Traffic capture duration does not work properly.
579253 Read only admin profiles have Read-Write privileges.
579414 IBE users are greeted by the SSO page after logon.
578985 Not able to configure high range port numbers in LDAP profiles.

Admin GUI and webmail

Bug ID

Description

584428 History log disposition field has wrong "Insert Disclaimer" message.
576017 Admin GUI has issue with displaying history log.

Common vulnerabilites and exposures

Visit https://fortiguard.com/psirt for more information.

Bug ID Description
(No bug ID)

FortiMail 6.2.1 is no longer vulnerable to the following CVE-Reference:

  • CVE-2019-10092
  • CVE-2019-10098
  • CVE-2019-10082
  • CVE-2019-10081
  • CVE-2019-9517
  • CVE-2019-10097
  • CVE-2019-15707
  • CVE-2019-15712