An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because an X509checkhost negative error code is interpreted as a successful return value.
[ { "deprecated": false, "target": { "file": "src/tunnel.c" }, "signature_type": "Line", "digest": { "line_hashes": [ "291243649204369111040426769665335560463", "47288886222928506793920805114664200831", "153992118258425434423935772526541605732", "37829039087882916392867691797325534195" ], "threshold": 0.9 }, "source": "https://github.com/adrienverge/openfortivpn/commit/60660e00b80bad0fadcf39aee86f6f8756c94f91", "id": "CVE-2020-7041-6498aa4a", "signature_version": "v1" }, { "deprecated": false, "target": { "file": "src/tunnel.c", "function": "ssl_verify_cert" }, "signature_type": "Function", "digest": { "length": 2381.0, "function_hash": "162382222799021665376847828159443033783" }, "source": "https://github.com/adrienverge/openfortivpn/commit/60660e00b80bad0fadcf39aee86f6f8756c94f91", "id": "CVE-2020-7041-97438fbb", "signature_version": "v1" } ]