CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
EPSS
Percentile
72.2%
CentOS Errata and Security Advisory CESA-2016:0063
The Network Time Protocol (NTP) is used to synchronize a computer’s time
with a referenced time source.
It was discovered that ntpd as a client did not correctly check the
originate timestamp in received packets. A remote attacker could use this
flaw to send a crafted packet to an ntpd client that would effectively
disable synchronization with the server, or push arbitrary offset/delay
measurements to modify the time on the client. (CVE-2015-8138)
All ntp users are advised to upgrade to these updated packages, which
contain a backported patch to resolve this issue. After installing the
update, the ntpd daemon will restart automatically.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2016-January/083785.html
https://lists.centos.org/pipermail/centos-announce/2016-January/083786.html
Affected packages:
ntp
ntp-doc
ntp-perl
ntpdate
sntp
Upstream details at:
https://access.redhat.com/errata/RHSA-2016:0063
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 6 | i686 | ntp | < 4.2.6p5-5.el6.centos.4 | ntp-4.2.6p5-5.el6.centos.4.i686.rpm |
CentOS | 6 | i686 | ntpdate | < 4.2.6p5-5.el6.centos.4 | ntpdate-4.2.6p5-5.el6.centos.4.i686.rpm |
CentOS | 6 | noarch | ntp-doc | < 4.2.6p5-5.el6.centos.4 | ntp-doc-4.2.6p5-5.el6.centos.4.noarch.rpm |
CentOS | 6 | i686 | ntp-perl | < 4.2.6p5-5.el6.centos.4 | ntp-perl-4.2.6p5-5.el6.centos.4.i686.rpm |
CentOS | 6 | x86_64 | ntp | < 4.2.6p5-5.el6.centos.4 | ntp-4.2.6p5-5.el6.centos.4.x86_64.rpm |
CentOS | 6 | x86_64 | ntpdate | < 4.2.6p5-5.el6.centos.4 | ntpdate-4.2.6p5-5.el6.centos.4.x86_64.rpm |
CentOS | 6 | noarch | ntp-doc | < 4.2.6p5-5.el6.centos.4 | ntp-doc-4.2.6p5-5.el6.centos.4.noarch.rpm |
CentOS | 6 | x86_64 | ntp-perl | < 4.2.6p5-5.el6.centos.4 | ntp-perl-4.2.6p5-5.el6.centos.4.x86_64.rpm |
CentOS | 7 | x86_64 | ntp | < 4.2.6p5-22.el7.centos.1 | ntp-4.2.6p5-22.el7.centos.1.x86_64.rpm |
CentOS | 7 | x86_64 | ntpdate | < 4.2.6p5-22.el7.centos.1 | ntpdate-4.2.6p5-22.el7.centos.1.x86_64.rpm |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
EPSS
Percentile
72.2%