Fortinet white logo
Fortinet white logo

Resolved issues

Resolved issues

The resolved issues listed below do not list every bug that has been corrected with this release. For inquires about a particular bug, please contact Fortinet Customer Service & Support.

Antispam/antivirus

Bug ID

Description

1280682

Password-protected XLS spreadsheet files were not be decrypted.

1277001

XLSX files inside of a winmail.dat file were incorrectly detected as XLS files.

1212055

Split QR codes in PDF files were not detected.

1215411

When the FortiSandbox timeout was reached, URL click protection returned an error message instead of allowing the URL according to the FortiSandbox timeout setting.

1236369

Color-coded URLs changed the URL format or category.

1237789

DMARC failure occurred for some valid senders.

1240303

Threat feed for a resource URL did not work properly.

1240477

URI redirect lookup did not work properly.

1244117

Content action in policy matches should have been classified as Not spam instead of Spam.

1213884

When the concurrent sessions were high, URI click protection did not work properly.

1267062

CDR did not work properly with some Microsoft Word files.

1226744

PDF QR code check should not have extracted embedded files.

1217442

After upgrading from v7.6.3 to v7.6.4, personal quarantine email cannot be released if the re-scan option is enabled.

1283521

Newsletter is not detected if FortiMail performs 'Expanding alias' based on the LDAP profile query.

1253268

Multi-line URL with hyphens is not handled properly.

1132000

Microsoft Office documents are detected as executable/vba although they do not contain any VBA scripts.

Email delivery

Bug ID

Description

1213935

If there were multiple long recipient addresses, then the X-FEAS-BEC-Info: message header was longer than 998 characters and not folded, which violates RFC 5322 section 2.1.1.

1212099

When there were multiple recipients and multiple matching policies, some recipients may not have received the email.

1237301

Email was dropped when there was an issue with the NAS server.

1239157

In some cases, email could not be sent. The error message was:

timeout before data read, where=eom

1255101

Email delivery failed due to a DNS TXT record limit.

1255737

In some cases, email continuity did not work properly.

1286724

ZIP files containing BAT files were not detected by the content filter.

System

Bug ID

Description

1054198

On a primary unit in an HA group, quarantine search has intermittent issues.

1277031

Quarantine search took an abnormally long time.

1274586

Unable to remove DKIM selectors with underscores.

1256422

The most recently installed CA certificate was not effective in the CA chain.

1272888

In active-active HA mode, personal block/safe lists created during HA down time were not synchronized after HA was restored.

1217869

An OFTP connection with FortiAnalyzer 7.4.8 requires the correct certificate option.

1217884

STARTTLS was not initiated for authentication in relay host tests under System > Mail Setting . Relay Host List.

1254934

After an upgrade from FortiMail 7.6.4 to 7.6.5 interim release, the HA group was out of sync.

1235809 1223903

High CPU usage was caused by the PDF scan.

1249685

High CPU usage was caused by text extraction from images in the PDF scan.

1227816

After an upgrade from FortiMail 7.6.3 to 7.6.4, after the command chattr sync-disable, active-passive HA synchronization had issues.

1222230

High CPU usage occurred on FML-900F models.

1220666

High CPU usage was caused by large files in the PDF scan.

1228791

High CPU usage was caused by regular expressions in the DLP scan.

1282440

Address map rewriting did not comply with RFC 2047 encoding for Cyrillic display names.

1290973

TLS signature algorithm still accepts SHA224 /DSA family.

1208387

When using FortiGate v7.6.3 with FortiMail v7.6.3, the security fabric cannot be established.

1167729

Fail to mount an external USB key.

Log and report

Bug ID

Description

1248953

After an uprade to FortiMail 7.6.4, regular expression errors were logged on every SSH login.

1232787

File names were not displayed correctly in logs.

1260702

Tables were truncated in downloaded PDF reports.

1284629

When there are multiple image attachments and one image is detected by 'Image Spam', there are no details in the log about which image was detected.

Administrator GUI/webmail

Bug ID

Description

1189608

In some cases, personal quarantine search did not work properly.

1272998

When logging into the administrative GUI using SSO, the administrator access profile that was applied (admin_sso) was not the profile that had been selected.

1265152

Quarantine email viewing issue with Mozilla Firefox.

Common Vulnerabilities and Exposures

FortiMail 7.6.5 is no longer vulnerable to the following CVE/CWE-References.

Visit https://fortiguard.com/psirt for more information.

Bug ID

Description

1241154

CWE-358: Improperly Implemented Security Check for Standard

1233871

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

1241590

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

1272856

1274518

CWE-476: NULL Pointer Dereference

1274537

CWE-358: Improperly Implemented Security Check for Standard

1234002

CWE-121: Stack-based Buffer Overflow

1286744

CWE-472: External Control of Assumed-Immutable Web Parameter

Resolved issues

Resolved issues

The resolved issues listed below do not list every bug that has been corrected with this release. For inquires about a particular bug, please contact Fortinet Customer Service & Support.

Antispam/antivirus

Bug ID

Description

1280682

Password-protected XLS spreadsheet files were not be decrypted.

1277001

XLSX files inside of a winmail.dat file were incorrectly detected as XLS files.

1212055

Split QR codes in PDF files were not detected.

1215411

When the FortiSandbox timeout was reached, URL click protection returned an error message instead of allowing the URL according to the FortiSandbox timeout setting.

1236369

Color-coded URLs changed the URL format or category.

1237789

DMARC failure occurred for some valid senders.

1240303

Threat feed for a resource URL did not work properly.

1240477

URI redirect lookup did not work properly.

1244117

Content action in policy matches should have been classified as Not spam instead of Spam.

1213884

When the concurrent sessions were high, URI click protection did not work properly.

1267062

CDR did not work properly with some Microsoft Word files.

1226744

PDF QR code check should not have extracted embedded files.

1217442

After upgrading from v7.6.3 to v7.6.4, personal quarantine email cannot be released if the re-scan option is enabled.

1283521

Newsletter is not detected if FortiMail performs 'Expanding alias' based on the LDAP profile query.

1253268

Multi-line URL with hyphens is not handled properly.

1132000

Microsoft Office documents are detected as executable/vba although they do not contain any VBA scripts.

Email delivery

Bug ID

Description

1213935

If there were multiple long recipient addresses, then the X-FEAS-BEC-Info: message header was longer than 998 characters and not folded, which violates RFC 5322 section 2.1.1.

1212099

When there were multiple recipients and multiple matching policies, some recipients may not have received the email.

1237301

Email was dropped when there was an issue with the NAS server.

1239157

In some cases, email could not be sent. The error message was:

timeout before data read, where=eom

1255101

Email delivery failed due to a DNS TXT record limit.

1255737

In some cases, email continuity did not work properly.

1286724

ZIP files containing BAT files were not detected by the content filter.

System

Bug ID

Description

1054198

On a primary unit in an HA group, quarantine search has intermittent issues.

1277031

Quarantine search took an abnormally long time.

1274586

Unable to remove DKIM selectors with underscores.

1256422

The most recently installed CA certificate was not effective in the CA chain.

1272888

In active-active HA mode, personal block/safe lists created during HA down time were not synchronized after HA was restored.

1217869

An OFTP connection with FortiAnalyzer 7.4.8 requires the correct certificate option.

1217884

STARTTLS was not initiated for authentication in relay host tests under System > Mail Setting . Relay Host List.

1254934

After an upgrade from FortiMail 7.6.4 to 7.6.5 interim release, the HA group was out of sync.

1235809 1223903

High CPU usage was caused by the PDF scan.

1249685

High CPU usage was caused by text extraction from images in the PDF scan.

1227816

After an upgrade from FortiMail 7.6.3 to 7.6.4, after the command chattr sync-disable, active-passive HA synchronization had issues.

1222230

High CPU usage occurred on FML-900F models.

1220666

High CPU usage was caused by large files in the PDF scan.

1228791

High CPU usage was caused by regular expressions in the DLP scan.

1282440

Address map rewriting did not comply with RFC 2047 encoding for Cyrillic display names.

1290973

TLS signature algorithm still accepts SHA224 /DSA family.

1208387

When using FortiGate v7.6.3 with FortiMail v7.6.3, the security fabric cannot be established.

1167729

Fail to mount an external USB key.

Log and report

Bug ID

Description

1248953

After an uprade to FortiMail 7.6.4, regular expression errors were logged on every SSH login.

1232787

File names were not displayed correctly in logs.

1260702

Tables were truncated in downloaded PDF reports.

1284629

When there are multiple image attachments and one image is detected by 'Image Spam', there are no details in the log about which image was detected.

Administrator GUI/webmail

Bug ID

Description

1189608

In some cases, personal quarantine search did not work properly.

1272998

When logging into the administrative GUI using SSO, the administrator access profile that was applied (admin_sso) was not the profile that had been selected.

1265152

Quarantine email viewing issue with Mozilla Firefox.

Common Vulnerabilities and Exposures

FortiMail 7.6.5 is no longer vulnerable to the following CVE/CWE-References.

Visit https://fortiguard.com/psirt for more information.

Bug ID

Description

1241154

CWE-358: Improperly Implemented Security Check for Standard

1233871

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

1241590

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

1272856

1274518

CWE-476: NULL Pointer Dereference

1274537

CWE-358: Improperly Implemented Security Check for Standard

1234002

CWE-121: Stack-based Buffer Overflow

1286744

CWE-472: External Control of Assumed-Immutable Web Parameter