First published: Tue Jan 31 2017(Updated: )
OpenNTPD before 6.0p1 does not validate the CN for HTTPS constraint requests, which allows remote attackers to bypass the man-in-the-middle mitigations via a crafted timestamp constraint with a valid certificate.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openntpd Openntpd | <=6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5117 is considered a medium severity vulnerability due to its potential to allow man-in-the-middle attacks on HTTPS constraint requests.
To fix CVE-2016-5117, upgrade OpenNTPD to version 6.0p1 or later, where the vulnerability is addressed.
CVE-2016-5117 is a security vulnerability that involves improper validation of HTTPS constraint requests.
OpenNTPD versions prior to 6.0p1 are affected by CVE-2016-5117.
CVE-2016-5117 can be exploited by remote attackers to bypass HTTPS man-in-the-middle mitigations.