Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-5117

Опубликовано: 31 янв. 2017
Источник: debian

Описание

OpenNTPD before 6.0p1 does not validate the CN for HTTPS constraint requests, which allows remote attackers to bypass the man-in-the-middle mitigations via a crafted timestamp constraint with a valid certificate.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openntpdfixed1:6.0p1-1package
openntpdnot-affectedjessiepackage
openntpdnot-affectedwheezypackage

Примечания

  • https://www.openwall.com/lists/oss-security/2016/05/23/2

  • Authenticated TLS "contraints" introduced in 2015-03-24 OpenNTPD 5.7p4

  • Option is not enabled at buildtime.

Связанные уязвимости

CVSS3: 5.9
ubuntu
около 9 лет назад

OpenNTPD before 6.0p1 does not validate the CN for HTTPS constraint requests, which allows remote attackers to bypass the man-in-the-middle mitigations via a crafted timestamp constraint with a valid certificate.

CVSS3: 5.9
nvd
около 9 лет назад

OpenNTPD before 6.0p1 does not validate the CN for HTTPS constraint requests, which allows remote attackers to bypass the man-in-the-middle mitigations via a crafted timestamp constraint with a valid certificate.

CVSS3: 5.9
github
больше 3 лет назад

OpenNTPD before 6.0p1 does not validate the CN for HTTPS constraint requests, which allows remote attackers to bypass the man-in-the-middle mitigations via a crafted timestamp constraint with a valid certificate.