Lucene search

K
freebsdFreeBSD3D95C9A7-7D5C-11E3-A8C1-206A8A720317
HistoryJan 01, 2014 - 12:00 a.m.

ntpd DRDoS / Amplification Attack using ntpdc monlist command

2014-01-0100:00:00
vuxml.freebsd.org
34

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.967 High

EPSS

Percentile

99.6%

ntp.org reports:

Unrestricted access to the monlist feature in
ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote
attackers to cause a denial of service (traffic
amplification) via forged (1) REQ_MON_GETLIST or (2)
REQ_MON_GETLIST_1 requests, as exploited in the wild in
December 2013
Use noquery to your default restrictions to block all
status queries.
Use disable monitor to disable the ``ntpdc -c monlist’’
command while still allowing other status queries.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchntp< 4.2.7p26UNKNOWN
FreeBSDanynoarchfreebsd= 8.3UNKNOWN
FreeBSDanynoarchfreebsd< 8.3_14UNKNOWN

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.967 High

EPSS

Percentile

99.6%