7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.873 High
EPSS
Percentile
98.6%
CentOS Errata and Security Advisory CESA-2015:1930
The Network Time Protocol (NTP) is used to synchronize a computer’s time
with a referenced time source.
It was discovered that ntpd as a client did not correctly check timestamps
in Kiss-of-Death packets. A remote attacker could use this flaw to send a
crafted Kiss-of-Death packet to an ntpd client that would increase the
client’s polling interval value, and effectively disable synchronization
with the server. (CVE-2015-7704)
It was found that ntpd did not correctly implement the threshold limitation
for the ‘-g’ option, which is used to set the time without any
restrictions. A man-in-the-middle attacker able to intercept NTP traffic
between a connecting client and an NTP server could use this flaw to force
that client to make multiple steps larger than the panic threshold,
effectively changing the time to an arbitrary value. (CVE-2015-5300)
Red Hat would like to thank Aanchal Malhotra, Isaac E. Cohen, and Sharon
Goldberg of Boston University for reporting these issues.
All ntp users are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues. After installing the
update, the ntpd daemon will restart automatically.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2015-October/083609.html
https://lists.centos.org/pipermail/centos-announce/2015-October/083610.html
Affected packages:
ntp
ntp-doc
ntp-perl
ntpdate
sntp
Upstream details at:
https://access.redhat.com/errata/RHSA-2015:1930
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 6 | i686 | ntp | < 4.2.6p5-5.el6.centos.2 | ntp-4.2.6p5-5.el6.centos.2.i686.rpm |
CentOS | 6 | i686 | ntpdate | < 4.2.6p5-5.el6.centos.2 | ntpdate-4.2.6p5-5.el6.centos.2.i686.rpm |
CentOS | 6 | noarch | ntp-doc | < 4.2.6p5-5.el6.centos.2 | ntp-doc-4.2.6p5-5.el6.centos.2.noarch.rpm |
CentOS | 6 | i686 | ntp-perl | < 4.2.6p5-5.el6.centos.2 | ntp-perl-4.2.6p5-5.el6.centos.2.i686.rpm |
CentOS | 6 | x86_64 | ntp | < 4.2.6p5-5.el6.centos.2 | ntp-4.2.6p5-5.el6.centos.2.x86_64.rpm |
CentOS | 6 | x86_64 | ntpdate | < 4.2.6p5-5.el6.centos.2 | ntpdate-4.2.6p5-5.el6.centos.2.x86_64.rpm |
CentOS | 6 | noarch | ntp-doc | < 4.2.6p5-5.el6.centos.2 | ntp-doc-4.2.6p5-5.el6.centos.2.noarch.rpm |
CentOS | 6 | x86_64 | ntp-perl | < 4.2.6p5-5.el6.centos.2 | ntp-perl-4.2.6p5-5.el6.centos.2.x86_64.rpm |
CentOS | 7 | x86_64 | ntp | < 4.2.6p5-19.el7.centos.3 | ntp-4.2.6p5-19.el7.centos.3.x86_64.rpm |
CentOS | 7 | x86_64 | ntpdate | < 4.2.6p5-19.el7.centos.3 | ntpdate-4.2.6p5-19.el7.centos.3.x86_64.rpm |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.873 High
EPSS
Percentile
98.6%