Lucene search

K
archlinuxArch LinuxASA-201606-4
HistoryJun 04, 2016 - 12:00 a.m.

ntp: distributed denial of service amplification

2016-06-0400:00:00
Arch Linux
lists.archlinux.org
14

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.937 High

EPSS

Percentile

98.9%

  • CVE-2016-4953 (distributed denial of service amplification)

An attacker who knows the origin timestamp and can send a spoofed packet
containing a CRYPTO-NAK to an ephemeral peer target before any other
response is sent can demobilize that association.
Credit to Miroslav Lichvar of Red Hat

  • CVE-2016-4954 (distributed denial of service amplification)

An attacker who is able to spoof packets with correct origin timestamps from
enough servers before the expected response packets arrive at the target
machine can affect some peer variables and, for example, cause a false leap
indication to be set. Credit to Jakub Prokes of Red Hat

  • CVE-2016-4955 (distributed denial of service amplification)

An attacker who is able to spoof a packet with a correct origin timestamp
before the expected response packet arrives at the target machine can send a
CRYPTO_NAK or a bad MAC and cause the association’s peer variables to be
cleared. If this can be done often enough, it will prevent that association
from working. Credit to Miroslav Lichvar of Red Hat

  • CVE-2016-4956 (distributed denial of service amplification)

The fix for NtpBug2978 does not cover broadcast associations, so broadcast
clients can be triggered to flip into interleave mode.
Credit to Miroslav Lichvar of Red Hat

  • CVE-2016-4957 (distributed denial of service amplification)

The fix for Sec 3007 in ntp-4.2.8p7 contained a bug that could cause ntpd to
crash. Credit to Nicolas Edet of Cisco

OSVersionArchitecturePackageVersionFilename
anyanyanyntp< 4.2.8.p8-1UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.937 High

EPSS

Percentile

98.9%