An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because an X509checkhost negative error code is interpreted as a successful return value.
[
{
"source": "https://github.com/adrienverge/openfortivpn/commit/60660e00b80bad0fadcf39aee86f6f8756c94f91",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "src/tunnel.c"
},
"id": "CVE-2020-7041-6498aa4a",
"digest": {
"threshold": 0.9,
"line_hashes": [
"291243649204369111040426769665335560463",
"47288886222928506793920805114664200831",
"153992118258425434423935772526541605732",
"37829039087882916392867691797325534195"
]
},
"signature_type": "Line"
},
{
"source": "https://github.com/adrienverge/openfortivpn/commit/60660e00b80bad0fadcf39aee86f6f8756c94f91",
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "ssl_verify_cert",
"file": "src/tunnel.c"
},
"id": "CVE-2020-7041-97438fbb",
"digest": {
"length": 2381.0,
"function_hash": "162382222799021665376847828159443033783"
},
"signature_type": "Function"
}
]