Vulnerability Description
An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because the hostname check operates on uninitialized memory. The outcome is that a valid certificate is never accepted (only a malformed certificate may be accepted).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openfortivpn Project | Openfortivpn | < 1.12.0 |
| Openssl | Openssl | <= 1.0.2 |
| Fedoraproject | Fedora | 30 |
| Opensuse | Backports Sle | 15.0 |
| Opensuse | Leap | 15.1 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00009.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00011.htmlMailing ListThird Party Advisory
- https://github.com/adrienverge/openfortivpn/commit/9eee997d599a89492281fc7ffdd79PatchThird Party Advisory
- https://github.com/adrienverge/openfortivpn/commit/cd9368c6a1b4ef91d77bb3fdbe2e5PatchThird Party Advisory
- https://github.com/adrienverge/openfortivpn/issues/536Issue TrackingThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00009.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00011.htmlMailing ListThird Party Advisory
- https://github.com/adrienverge/openfortivpn/commit/9eee997d599a89492281fc7ffdd79PatchThird Party Advisory
- https://github.com/adrienverge/openfortivpn/commit/cd9368c6a1b4ef91d77bb3fdbe2e5PatchThird Party Advisory
- https://github.com/adrienverge/openfortivpn/issues/536Issue TrackingThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
FAQ
What is CVE-2020-7042?
CVE-2020-7042 is a vulnerability with a CVSS score of 5.3 (MEDIUM). An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because the hostname check operates on uninitialized memory. The outcom...
How severe is CVE-2020-7042?
CVE-2020-7042 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-7042?
Check the references section above for vendor advisories and patch information. Affected products include: Openfortivpn Project Openfortivpn, Openssl Openssl, Fedoraproject Fedora, Opensuse Backports Sle, Opensuse Leap.