Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-7041

Опубликовано: 27 фев. 2020
Источник: debian
EPSS Низкий

Описание

An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because an X509_check_host negative error code is interpreted as a successful return value.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openfortivpnfixed1.12.0-1package
openfortivpnno-dsabusterpackage

Примечания

  • https://github.com/adrienverge/openfortivpn/issues/536

  • https://github.com/adrienverge/openfortivpn/commit/60660e00b80bad0fadcf39aee86f6f8756c94f91

EPSS

Процентиль: 74%
0.00843
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
почти 6 лет назад

An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because an X509_check_host negative error code is interpreted as a successful return value.

CVSS3: 5.3
nvd
почти 6 лет назад

An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because an X509_check_host negative error code is interpreted as a successful return value.

github
больше 3 лет назад

An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because an X509_check_host negative error code is interpreted as a successful return value.

suse-cvrf
почти 6 лет назад

Security update for openfortivpn

EPSS

Процентиль: 74%
0.00843
Низкий