Vulnerability Description
An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because an X509_check_host negative error code is interpreted as a successful return value.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openfortivpn Project | Openfortivpn | < 1.12.0 |
| Openssl | Openssl | <= 1.0.2 |
| Fedoraproject | Fedora | 30 |
| Opensuse | Backports Sle | 15.0 |
| Opensuse | Leap | 15.1 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00009.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00011.htmlMailing ListThird Party Advisory
- https://github.com/adrienverge/openfortivpn/commit/60660e00b80bad0fadcf39aee86f6PatchThird Party Advisory
- https://github.com/adrienverge/openfortivpn/commit/cd9368c6a1b4ef91d77bb3fdbe2e5PatchThird Party Advisory
- https://github.com/adrienverge/openfortivpn/issues/536Issue TrackingThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00009.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00011.htmlMailing ListThird Party Advisory
- https://github.com/adrienverge/openfortivpn/commit/60660e00b80bad0fadcf39aee86f6PatchThird Party Advisory
- https://github.com/adrienverge/openfortivpn/commit/cd9368c6a1b4ef91d77bb3fdbe2e5PatchThird Party Advisory
- https://github.com/adrienverge/openfortivpn/issues/536Issue TrackingThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
FAQ
What is CVE-2020-7041?
CVE-2020-7041 is a vulnerability with a CVSS score of 5.3 (MEDIUM). An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because an X509_check_host negative error code is interpreted as a succ...
How severe is CVE-2020-7041?
CVE-2020-7041 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-7041?
Check the references section above for vendor advisories and patch information. Affected products include: Openfortivpn Project Openfortivpn, Openssl Openssl, Fedoraproject Fedora, Opensuse Backports Sle, Opensuse Leap.