CVE-2016-5117

OpenNTPD before 6.0p1 does not validate the CN for HTTPS constraint requests, which allows remote attackers to bypass the man-in-the-middle mitigations via a crafted timestamp constraint with a valid certificate.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openntpd:openntpd:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:53

Type Values Removed Values Added
References () http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/ntpd/constraint.c.diff?r1=1.27&r2=1.28 - Patch () http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/ntpd/constraint.c.diff?r1=1.27&r2=1.28 - Patch
References () http://www.openntpd.org/txt/release-6.0p1.txt - Vendor Advisory () http://www.openntpd.org/txt/release-6.0p1.txt - Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2016/05/23/2 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/05/23/2 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/05/29/6 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/05/29/6 - Mailing List, Third Party Advisory

Information

Published : 2017-01-31 19:59

Updated : 2024-11-21 02:53


NVD link : CVE-2016-5117

Mitre link : CVE-2016-5117

CVE.ORG link : CVE-2016-5117


JSON object : View

Products Affected

openntpd

  • openntpd
CWE
CWE-254

7PK - Security Features