AIX 6.1 TL 9 NTP Security Vulnerabilitie
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
Tenable Nessus | AIX NTP v4 Advisory : ntp_advisory6.asc (IV83983) (IV83992) | 18 Jul 201600:00 | – | nessus |
Tenable Nessus | AIX NTP v3 Advisory : ntp_advisory6.asc (IV83984) (IV83993) (IV83994) (IV83995) (IV84269) | 18 Jul 201600:00 | – | nessus |
Tenable Nessus | AIX 7.2 TL 0 : ntp (IV83995) (deprecated) | 9 Jun 201600:00 | – | nessus |
Tenable Nessus | AIX 5.3 TL 12 : ntp (IV84269) (deprecated) | 9 Jun 201600:00 | – | nessus |
Tenable Nessus | AIX 7.1 TL 3 : ntp (IV83993) (deprecated) | 9 Jun 201600:00 | – | nessus |
Tenable Nessus | AIX 7.1 TL 4 : ntp (IV83994) (deprecated) | 9 Jun 201600:00 | – | nessus |
Tenable Nessus | Network Time Protocol Daemon (ntpd) 3.x / 4.x < 4.2.8p6 Multiple Vulnerabilities | 21 Jan 201600:00 | – | nessus |
Tenable Nessus | FreeBSD : ntp -- multiple vulnerabilities (5237f5d7-c020-11e5-b397-d050996490d0) | 22 Jan 201600:00 | – | nessus |
Tenable Nessus | SUSE SLED12 / SLES12 Security Update : ntp (SUSE-SU-2016:1177-1) | 2 May 201600:00 | – | nessus |
Tenable Nessus | openSUSE Security Update : ntp (openSUSE-2016-578) | 13 May 201600:00 | – | nessus |
#%NASL_MIN_LEVEL 999999
#
# (C) Tenable Network Security, Inc.
#
# The text in the description was extracted from AIX Security
# Advisory ntp_advisory6.asc.
#
# @DEPRECATED@
#
# Disabled on 2017/01/20. Deprecated by aix_ntp_v3_advisory6.nasl.
#
include("compat.inc");
if (description)
{
script_id(91516);
script_version("2.5");
script_cvs_date("Date: 2018/07/20 0:18:51");
script_cve_id("CVE-2015-7973", "CVE-2015-7977", "CVE-2015-7979", "CVE-2015-8139", "CVE-2015-8140", "CVE-2015-8158");
script_name(english:"AIX 6.1 TL 9 : ntp (IV83984) (deprecated)");
script_summary(english:"Check for APAR IV83984");
script_set_attribute(
attribute:"synopsis",
value:"This plugin has been deprecated."
);
script_set_attribute(
attribute:"description",
value:
"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7973 NTP could
allow a remote attacker to launch a replay attack. An attacker could
exploit this vulnerability using authenticated broadcast mode packets
to conduct a replay attack and gain unauthorized access to the system.
NTP is vulnerable to a denial of service, caused by a NULL pointer
dereference. By sending a specially crafted ntpdc reslist command, an
attacker could exploit this vulnerability to cause a segmentation
fault. NTP could allow a remote attacker to bypass security
restrictions. By sending specially crafted broadcast packets with bad
authentication, an attacker could exploit this vulnerability to cause
the target broadcast client to tear down the association with the
broadcast server. NTP could allow a remote attacker to obtain
sensitive information, caused by an origin leak in ntpq and ntpdc. An
attacker could exploit this vulnerability to obtain sensitive
information. NTP could allow a remote attacker to launch a replay
attack. An attacker could exploit this vulnerability using ntpq to
conduct a replay attack and gain unauthorized access to the system.
NTP is vulnerable to a denial of service, caused by the improper
processing of incoming packets by ntpq. By sending specially crafted
data, an attacker could exploit this vulnerability to cause the
application to enter into an infinite loop.
This plugin has been deprecated due to manual logic changes and
advisory issues. Use aix_ntp_v3_advisory6.nasl (plugin ID 92356)
instead."
);
script_set_attribute(
attribute:"see_also",
value:"http://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc"
);
script_set_attribute(
attribute:"solution",
value:"n/a"
);
script_set_attribute(attribute:"risk_factor", value:"High");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:ibm:aix:6.1");
script_set_attribute(attribute:"vuln_publication_date", value:"2016/06/08");
script_set_attribute(attribute:"patch_publication_date", value:"2016/06/08");
script_set_attribute(attribute:"plugin_publication_date", value:"2016/06/09");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2016-2018 Tenable Network Security, Inc.");
script_family(english:"AIX Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/AIX/lslpp", "Host/local_checks_enabled", "Host/AIX/version");
exit(0);
}
exit(0, "This plugin has been deprecated. Use aix_ntp_v3_advisory6.nasl (plugin ID 92356) instead.");
include("audit.inc");
include("global_settings.inc");
include("aix.inc");
include("misc_func.inc");
if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if ( ! get_kb_item("Host/AIX/version") ) audit(AUDIT_OS_NOT, "AIX");
if ( ! get_kb_item("Host/AIX/lslpp") ) audit(AUDIT_PACKAGE_LIST_MISSING);
if ( get_kb_item("Host/AIX/emgr_failure" ) ) exit(0, "This iFix check is disabled because : "+get_kb_item("Host/AIX/emgr_failure") );
flag = 0;
if (aix_check_ifix(release:"6.1", ml:"09", sp:"04", patch:"IV83984m4a", package:"bos.net.tcp.client", minfilesetver:"6.1.9.0", maxfilesetver:"6.1.9.102") < 0) flag++;
if (aix_check_ifix(release:"6.1", ml:"09", sp:"05", patch:"IV83984m5a", package:"bos.net.tcp.client", minfilesetver:"6.1.9.0", maxfilesetver:"6.1.9.102") < 0) flag++;
if (aix_check_ifix(release:"6.1", ml:"09", sp:"06", patch:"IV83984m6a", package:"bos.net.tcp.client", minfilesetver:"6.1.9.0", maxfilesetver:"6.1.9.102") < 0) flag++;
if (aix_check_ifix(release:"6.1", ml:"09", sp:"07", patch:"IV83984s7a", package:"bos.net.tcp.client", minfilesetver:"6.1.9.0", maxfilesetver:"6.1.9.102") < 0) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:aix_report_get());
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo