CVE-2020-7042
Summary
| CVE | CVE-2020-7042 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-02-27 18:15:00 UTC |
| Updated | 2023-11-07 03:25:00 UTC |
| Description | An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because the hostname check operates on uninitialized memory. The outcome is that a valid certificate is never accepted (only a malformed certificate may be accepted). |
Risk And Classification
Problem Types: CWE-295 | CWE-908
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Fedoraproject | Fedora | 30 | All | All | All |
| Operating System | Fedoraproject | Fedora | 31 | All | All | All |
| Operating System | Fedoraproject | Fedora | 32 | All | All | All |
| Operating System | Fedoraproject | Fedora | 30 | All | All | All |
| Operating System | Fedoraproject | Fedora | 31 | All | All | All |
| Operating System | Fedoraproject | Fedora | 32 | All | All | All |
| Application | Openfortivpn Project | Openfortivpn | All | All | All | All |
| Application | Openfortivpn Project | Openfortivpn | All | All | All | All |
| Application | Openssl | Openssl | All | All | All | All |
| Application | Openssl | Openssl | All | All | All | All |
| Application | Opensuse | Backports Sle | 15.0 | sp1 | All | All |
| Application | Opensuse | Backports Sle | 15.0 | sp1 | All | All |
| Operating System | Opensuse | Leap | 15.1 | All | All | All |
| Operating System | Opensuse | Leap | 15.1 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [security-announce] openSUSE-SU-2020:0305-1: important: Security update | SUSE | lists.opensuse.org | Mailing List, Third Party Advisory |
| [SECURITY] Fedora 30 Update: openfortivpn-1.12.0-1.fc30 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org | ||
| Security Contact · Issue #536 · adrienverge/openfortivpn · GitHub | MISC | github.com | Issue Tracking, Third Party Advisory |
| openfortivpn version 1.12.0 · adrienverge/openfortivpn@cd9368c · GitHub | MISC | github.com | Patch, Third Party Advisory |
| [SECURITY] Fedora 31 Update: openfortivpn-1.12.0-1.fc31 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org | ||
| [SECURITY] Fedora 32 Update: openfortivpn-1.12.0-1.fc32 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org | ||
| [security-announce] openSUSE-SU-2020:0301-1: important: Security update | SUSE | lists.opensuse.org | Mailing List, Third Party Advisory |
| [SECURITY] Fedora 30 Update: openfortivpn-1.12.0-1.fc30 - package-announce - Fedora Mailing-Lists | FEDORA | lists.fedoraproject.org | Third Party Advisory |
| supply proper input buffer to X509_check_host · adrienverge/openfortivpn@9eee997 · GitHub | CONFIRM | github.com | Patch, Third Party Advisory |
| [SECURITY] Fedora 31 Update: openfortivpn-1.12.0-1.fc31 - package-announce - Fedora Mailing-Lists | FEDORA | lists.fedoraproject.org | Third Party Advisory |
| [SECURITY] Fedora 32 Update: openfortivpn-1.12.0-1.fc32 - package-announce - Fedora Mailing-Lists | FEDORA | lists.fedoraproject.org | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.