ID AIX_U832837.NASL Type nessus Reporter This script is Copyright (C) 2010-2021 Tenable Network Security, Inc. Modified 2010-05-19T00:00:00
Description
The remote host is missing AIX PTF U832837, which is related to the
security of the package bos.net.tcp.client.
NTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control
utility. In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while
routine NTP time transfers use modes 1 through 5. Upon receipt of an
incorrect mode 7 request or a mode 7 error response from an address
that is not listed in a 'restrict ... noquery' or 'restrict ...
ignore' segment, ntpd will reply with a mode 7 error response and log
a message.
If an attacker spoofs the source address of ntpd host A in a mode 7
response packet sent to ntpd host B, both A and B will continuously
send each other error responses, for as long as those packets get
through.
If an attacker spoofs an address of ntpd host A in a mode 7
response packet sent to ntpd host A, then host A will
respond to itself endlessly, consuming CPU and logging
excessively.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were extracted
# from AIX Security PTF U832837. The text itself is copyright (C)
# International Business Machines Corp.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(46553);
script_version("1.4");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/04");
script_name(english:"AIX 5.3 TL 11 : bos.net.tcp.client (U832837)");
script_summary(english:"Check for PTF U832837");
script_set_attribute(
attribute:"synopsis",
value:"The remote AIX host is missing a vendor-supplied security patch."
);
script_set_attribute(
attribute:"description",
value:
"The remote host is missing AIX PTF U832837, which is related to the
security of the package bos.net.tcp.client.
NTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control
utility. In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while
routine NTP time transfers use modes 1 through 5. Upon receipt of an
incorrect mode 7 request or a mode 7 error response from an address
that is not listed in a 'restrict ... noquery' or 'restrict ...
ignore' segment, ntpd will reply with a mode 7 error response and log
a message.
If an attacker spoofs the source address of ntpd host A in a mode 7
response packet sent to ntpd host B, both A and B will continuously
send each other error responses, for as long as those packets get
through.
If an attacker spoofs an address of ntpd host A in a mode 7
response packet sent to ntpd host A, then host A will
respond to itself endlessly, consuming CPU and logging
excessively.
"
);
script_set_attribute(
attribute:"see_also",
value:"http://www-01.ibm.com/support/docview.wss?uid=isg1IZ71610"
);
script_set_attribute(
attribute:"solution",
value:"Install the appropriate missing security-related fix."
);
script_set_attribute(attribute:"risk_factor", value:"High");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:ibm:aix:5.3");
script_set_attribute(attribute:"vuln_publication_date", value:"2010/03/01");
script_set_attribute(attribute:"patch_publication_date", value:"2010/03/01");
script_set_attribute(attribute:"plugin_publication_date", value:"2010/05/19");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.");
script_family(english:"AIX Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/AIX/oslevel", "Host/AIX/version", "Host/AIX/lslpp");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("aix.inc");
if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if ( ! get_kb_item("Host/AIX/version") ) audit(AUDIT_OS_NOT, "AIX");
if ( ! get_kb_item("Host/AIX/lslpp") ) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if ( aix_check_patch(ml:"530011", patch:"U832837", package:"bos.net.tcp.client.5.3.11.3") < 0 ) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:aix_report_get());
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
{"id": "AIX_U832837.NASL", "bulletinFamily": "scanner", "title": "AIX 5.3 TL 11 : bos.net.tcp.client (U832837)", "description": "The remote host is missing AIX PTF U832837, which is related to the\nsecurity of the package bos.net.tcp.client.\n\nNTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control\nutility. In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while\nroutine NTP time transfers use modes 1 through 5. Upon receipt of an\nincorrect mode 7 request or a mode 7 error response from an address\nthat is not listed in a 'restrict ... noquery' or 'restrict ...\nignore' segment, ntpd will reply with a mode 7 error response and log\na message.\n\nIf an attacker spoofs the source address of ntpd host A in a mode 7\nresponse packet sent to ntpd host B, both A and B will continuously\nsend each other error responses, for as long as those packets get\nthrough.\n\nIf an attacker spoofs an address of ntpd host A in a mode 7\nresponse packet sent to ntpd host A, then host A will\nrespond to itself endlessly, consuming CPU and logging\nexcessively.\n", "published": "2010-05-19T00:00:00", "modified": "2010-05-19T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.tenable.com/plugins/nessus/46553", "reporter": "This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.", "references": ["http://www-01.ibm.com/support/docview.wss?uid=isg1IZ71610"], "cvelist": [], "type": "nessus", "lastseen": "2021-01-06T09:18:18", "edition": 22, "viewCount": 2, "enchantments": {"dependencies": {"references": [], "modified": "2021-01-06T09:18:18", "rev": 2}, "score": {"value": -0.3, "vector": "NONE", "modified": "2021-01-06T09:18:18", "rev": 2}, "vulnersScore": -0.3}, "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were extracted\n# from AIX Security PTF U832837. The text itself is copyright (C)\n# International Business Machines Corp.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(46553);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_name(english:\"AIX 5.3 TL 11 : bos.net.tcp.client (U832837)\");\n script_summary(english:\"Check for PTF U832837\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote AIX host is missing a vendor-supplied security patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is missing AIX PTF U832837, which is related to the\nsecurity of the package bos.net.tcp.client.\n\nNTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control\nutility. In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while\nroutine NTP time transfers use modes 1 through 5. Upon receipt of an\nincorrect mode 7 request or a mode 7 error response from an address\nthat is not listed in a 'restrict ... noquery' or 'restrict ...\nignore' segment, ntpd will reply with a mode 7 error response and log\na message.\n\nIf an attacker spoofs the source address of ntpd host A in a mode 7\nresponse packet sent to ntpd host B, both A and B will continuously\nsend each other error responses, for as long as those packets get\nthrough.\n\nIf an attacker spoofs an address of ntpd host A in a mode 7\nresponse packet sent to ntpd host A, then host A will\nrespond to itself endlessly, consuming CPU and logging\nexcessively.\n\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www-01.ibm.com/support/docview.wss?uid=isg1IZ71610\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install the appropriate missing security-related fix.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:ibm:aix:5.3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/03/01\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/03/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/05/19\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.\");\n script_family(english:\"AIX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AIX/oslevel\", \"Host/AIX/version\", \"Host/AIX/lslpp\");\n\n exit(0);\n}\n\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"aix.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif ( ! get_kb_item(\"Host/AIX/version\") ) audit(AUDIT_OS_NOT, \"AIX\");\nif ( ! get_kb_item(\"Host/AIX/lslpp\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nflag = 0;\n\nif ( aix_check_patch(ml:\"530011\", patch:\"U832837\", package:\"bos.net.tcp.client.5.3.11.3\") < 0 ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:aix_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "naslFamily": "AIX Local Security Checks", "pluginID": "46553", "cpe": ["cpe:/o:ibm:aix:5.3"], "scheme": null}