CVE-2016-5117

NameCVE-2016-5117
DescriptionOpenNTPD before 6.0p1 does not validate the CN for HTTPS constraint requests, which allows remote attackers to bypass the man-in-the-middle mitigations via a crafted timestamp constraint with a valid certificate.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs825856

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openntpd (PTS)buster1:6.2p3-4fixed
sid, trixie, bookworm, bullseye1:6.2p3-4.2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
openntpdsourcewheezy(not affected)
openntpdsourcejessie(not affected)
openntpdsource(unstable)1:6.0p1-1unimportant825856

Notes

[jessie] - openntpd <not-affected> (Vulnerable code introduced later)
[wheezy] - openntpd <not-affected> (Vulnerable code introduced later)
https://www.openwall.com/lists/oss-security/2016/05/23/2
Authenticated TLS "contraints" introduced in 2015-03-24 OpenNTPD 5.7p4
Option is not enabled at buildtime.

Search for package or bug name: Reporting problems