An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because an X509checkhost negative error code is interpreted as a successful return value.
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "15.0-sp1"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "30"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "31"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "32"
}
]
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "15.1"
}
],
"cpe": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
}
]
}{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:openfortivpn_project:openfortivpn:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "1.12.0"
}
]
}