Lucene search

K
ibmIBM02EAC77BA7927FCABEEEEABCCB69BB3078BEE3713C3FE5B24D773204DC869895
HistoryOct 18, 2019 - 3:10 a.m.

Security Bulletin: IBM Netezza Host Management NTP vulnerabilities (CVE-2014-9293, CVE-2014-9294, CVE-2014-9295, CVE-2014-9296)

2019-10-1803:10:29
www.ibm.com
43

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

Summary

Multiple vulnerabilities were found in the Linux NTP component. RedHat released a patch to address these vulnerabilities.

Vulnerability Details

CVEID:_CVE-2014-9293 _

DESCRIPTION:

Network Time Protocol (NTP) Project NTP daemon (ntpd) could provide weaker than expected security, caused by the improper generation of a key by the config_auth function when an auth key is not configured. A remote attacker could exploit this vulnerability using brute force techniques to guess the generated key.

CVSS Base Score: 5.00
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/99576 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVEID:_CVE-2014-9294 _

DESCRIPTION:

Network Time Protocol (NTP) Project NTP daemon (ntpd) could provide weaker than expected security, caused by the use of a weak RNG seed by ntp-keygen.c. A remote attacker could exploit this vulnerability using brute force techniques to defeat cryptographic protection mechanisms.

CVSS Base Score: 5.00
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/99577 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVEID:_CVE-2014-9295 _

DESCRIPTION:

Network Time Protocol (NTP) Project NTP daemon (ntpd) is vulnerable to multiple stack-based buffer overflows, caused by improper bounds checking by ntpd. By sending specially-crafted packets, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.

CVSS Base Score: 7.50
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/99578 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVEID:_CVE-2014-9296 _

DESCRIPTION:

Network Time Protocol (NTP) Project NTP daemon (ntpd) is vulnerable to a denial of service, caused by the continual execution of the receive function after detecting an error. By sending specially-crafted packets, a remote attacker could exploit this vulnerability to cause a denial of service.

CVSS Base Score: 5.00
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/99579 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Affected Products and Versions

IBM Netezza Host Management 5.3.3 and earlier.

Remediation/Fixes

Product VRMF

| APAR| Remediation/First Fix
—|—|—
IBM Netezza Host Management 5.3.3.0|
| Link to IBM Fix Central

Workarounds and Mitigations

None

CPENameOperatorVersion
ibm puredata systemeq1.0.0

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P