{"id":"CVE-2020-7042","details":"An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because the hostname check operates on uninitialized memory. The outcome is that a valid certificate is never accepted (only a malformed certificate may be accepted).","modified":"2026-04-11T13:53:24.358817Z","published":"2020-02-27T18:15:11.547Z","related":["openSUSE-SU-2020:0301-1","openSUSE-SU-2020:0305-1","openSUSE-SU-2024:11118-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FF6HYIBREQGATRM5COF57MRQWKOKCWZ3/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SRVVNXCNTNMPCIAZIVR4FAGYCSU53FNA/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKNKSGBVYGRRVRLFEFBEKUEJYJR5LWOF/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00009.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00011.html"},{"type":"REPORT","url":"https://github.com/adrienverge/openfortivpn/issues/536"},{"type":"FIX","url":"https://github.com/adrienverge/openfortivpn/commit/9eee997d599a89492281fc7ffdd79d88cd61afc3"},{"type":"FIX","url":"https://github.com/adrienverge/openfortivpn/commit/cd9368c6a1b4ef91d77bb3fdbe2e5bc34aa6f4c4"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/adrienverge/openfortivpn","events":[{"introduced":"0"},{"fixed":"cd9368c6a1b4ef91d77bb3fdbe2e5bc34aa6f4c4"},{"fixed":"9eee997d599a89492281fc7ffdd79d88cd61afc3"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.12.0"}]}}],"versions":["v1.0.0","v1.0.1","v1.1.0","v1.1.1","v1.1.2","v1.1.3","v1.1.4","v1.10.0","v1.11.0","v1.2.0","v1.3.0","v1.3.1","v1.4.0","v1.5.0","v1.6.0","v1.7.0","v1.7.1","v1.8.0","v1.8.1","v1.9.0"],"database_specific":{"vanir_signatures_modified":"2026-04-11T13:53:24Z","source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-7042.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"32"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0-sp1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]}],"vanir_signatures":[{"signature_version":"v1","deprecated":false,"signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["283993573798252670453987687364804281647","274844904252654247726432834330319061935","112562871745171916936322649166284259591","17798813236066237521886087447635982369","2418362587896680329337858234838332300","109426978569026790148195875681155806346","164160928021241801951192137959973253490","289510098859083578787605135355407124387","258380727189941271346228600724644525725","25863080627499099625509319637019956460"]},"id":"CVE-2020-7042-6fb1fe2a","target":{"file":"src/tunnel.c"},"source":"https://github.com/adrienverge/openfortivpn/commit/9eee997d599a89492281fc7ffdd79d88cd61afc3"},{"signature_version":"v1","deprecated":false,"signature_type":"Function","digest":{"function_hash":"229937577464691850782465159833446126831","length":2386},"id":"CVE-2020-7042-975f888f","target":{"file":"src/tunnel.c","function":"ssl_verify_cert"},"source":"https://github.com/adrienverge/openfortivpn/commit/9eee997d599a89492281fc7ffdd79d88cd61afc3"}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}]}