An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because the hostname check operates on uninitialized memory. The outcome is that a valid certificate is never accepted (only a malformed certificate may be accepted).
[
{
"source": "https://github.com/adrienverge/openfortivpn/commit/9eee997d599a89492281fc7ffdd79d88cd61afc3",
"id": "CVE-2020-7042-6fb1fe2a",
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"283993573798252670453987687364804281647",
"274844904252654247726432834330319061935",
"112562871745171916936322649166284259591",
"17798813236066237521886087447635982369",
"2418362587896680329337858234838332300",
"109426978569026790148195875681155806346",
"164160928021241801951192137959973253490",
"289510098859083578787605135355407124387",
"258380727189941271346228600724644525725",
"25863080627499099625509319637019956460"
],
"threshold": 0.9
},
"signature_type": "Line",
"target": {
"file": "src/tunnel.c"
}
},
{
"source": "https://github.com/adrienverge/openfortivpn/commit/9eee997d599a89492281fc7ffdd79d88cd61afc3",
"id": "CVE-2020-7042-975f888f",
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "229937577464691850782465159833446126831",
"length": 2386.0
},
"signature_type": "Function",
"target": {
"function": "ssl_verify_cert",
"file": "src/tunnel.c"
}
}
]