OpenNTPD before 6.0p1 does not validate the CN for HTTPS constraint requests, which allows remote attackers to bypass the man-in-the-middle mitigations via a crafted timestamp constraint with a valid certificate.
References
Link | Resource |
---|---|
http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/ntpd/constraint.c.diff?r1=1.27&r2=1.28 | Patch |
http://www.openntpd.org/txt/release-6.0p1.txt | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2016/05/23/2 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/05/29/6 | Mailing List Third Party Advisory |
http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/ntpd/constraint.c.diff?r1=1.27&r2=1.28 | Patch |
http://www.openntpd.org/txt/release-6.0p1.txt | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2016/05/23/2 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/05/29/6 | Mailing List Third Party Advisory |
Configurations
History
21 Nov 2024, 02:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/ntpd/constraint.c.diff?r1=1.27&r2=1.28 - Patch | |
References | () http://www.openntpd.org/txt/release-6.0p1.txt - Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2016/05/23/2 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2016/05/29/6 - Mailing List, Third Party Advisory |
Information
Published : 2017-01-31 19:59
Updated : 2024-11-21 02:53
NVD link : CVE-2016-5117
Mitre link : CVE-2016-5117
CVE.ORG link : CVE-2016-5117
JSON object : View
Products Affected
openntpd
- openntpd
CWE
CWE-254
7PK - Security Features