OpenNTPD before 6.0p1 does not validate the CN for HTTPS constraint requests, which allows remote attackers to bypass the man-in-the-middle mitigations via a crafted timestamp constraint with a valid certificate.
Software security is not security software. Here we're concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.
Link | Tags |
---|---|
http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/ntpd/constraint.c.diff?r1=1.27&r2=1.28 | patch |
http://www.openwall.com/lists/oss-security/2016/05/23/2 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2016/05/29/6 | third party advisory mailing list |
http://www.openntpd.org/txt/release-6.0p1.txt | vendor advisory |