First published: Thu Feb 27 2020(Updated: )
An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL before 1.0.2. tunnel.c mishandles certificate validation because hostname comparisons do not consider '\0' characters, as demonstrated by a good.example.com\x00evil.example.com attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openfortivpn Project Openfortivpn | <1.12.0 | |
OpenSSL OpenSSL | <1.0.2 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
openSUSE Backports SLE | =15.0-sp1 | |
openSUSE Leap | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-7043 is critical with a CVSS score of 9.1.
CVE-2020-7043 affects openfortivpn version 1.11.0 up to, but not including, version 1.12.0.
OpenSSL versions before 1.0.2 are vulnerable to CVE-2020-7043.
To fix CVE-2020-7043 in openfortivpn, upgrade to version 1.12.0 or later.
Yes, you can find references for CVE-2020-7043 at the following links: - http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00009.html - http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00011.html - https://github.com/adrienverge/openfortivpn/commit/6328a070ddaab16faaf008cb9a8a62439c30f2a8