OpenNTPD before 6.0p1 does not validate the CN for HTTPS constraint requests, which allows remote attackers to bypass the man-in-the-middle mitigations via a crafted timestamp constraint with a valid certificate.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2016/05/29/6 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/05/23/2 | Mailing List Third Party Advisory |
http://www.openntpd.org/txt/release-6.0p1.txt | Vendor Advisory |
http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/ntpd/constraint.c.diff?r1=1.27&r2=1.28 | Patch |
Configurations
Information
Published : 2017-01-31 11:59
Updated : 2017-02-24 11:26
NVD link : CVE-2016-5117
Mitre link : CVE-2016-5117
JSON object : View
CWE
CWE-254
7PK - Security Features
Products Affected
openntpd
- openntpd