Huawei EulerOS 'ntp' package update (EulerOS-SA-2020-1893) for ARM 64 3.0.6.
Reporter | Title | Published | Views | Family All 119 |
---|---|---|---|---|
![]() | [SECURITY] Fedora 32 Update: ntp-4.2.8p15-1.fc32 | 2 Jul 202001:13 | – | fedora |
![]() | ntp security update | 24 Jun 202000:00 | – | oraclelinux |
![]() | EulerOS 2.0 SP8 : ntp (EulerOS-SA-2020-1817) | 30 Jul 202000:00 | – | nessus |
![]() | Scientific Linux Security Update : ntp on SL7.x x86_64 (20200623) | 24 Jun 202000:00 | – | nessus |
![]() | CentOS 7 : ntp (RHSA-2020:2663) | 24 Jun 202000:00 | – | nessus |
![]() | Oracle Linux 7 : ntp (ELSA-2020-2663) | 25 Jun 202000:00 | – | nessus |
![]() | RHEL 7 : ntp (RHSA-2020:2663) | 25 Jun 202000:00 | – | nessus |
![]() | EulerOS Virtualization 3.0.2.2 : ntp (EulerOS-SA-2021-2151) | 6 Jul 202100:00 | – | nessus |
![]() | EulerOS Virtualization for ARM 64 3.0.2.0 : ntp (EulerOS-SA-2020-1968) | 8 Sep 202000:00 | – | nessus |
![]() | EulerOS Virtualization for ARM 64 3.0.6.0 : ntp (EulerOS-SA-2020-1893) | 28 Aug 202000:00 | – | nessus |
Source | Link |
---|---|
developer | www.developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html |
# SPDX-FileCopyrightText: 2020 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.2.2020.1893");
script_cve_id("CVE-2020-11868", "CVE-2020-13817");
script_tag(name:"creation_date", value:"2020-08-31 07:04:43 +0000 (Mon, 31 Aug 2020)");
script_version("2024-02-05T14:36:56+0000");
script_tag(name:"last_modification", value:"2024-02-05 14:36:56 +0000 (Mon, 05 Feb 2024)");
script_tag(name:"cvss_base", value:"5.8");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:P/A:P");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2020-06-09 17:30:18 +0000 (Tue, 09 Jun 2020)");
script_name("Huawei EulerOS: Security Advisory for ntp (EulerOS-SA-2020-1893)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2020 Greenbone AG");
script_family("Huawei EulerOS Local Security Checks");
script_dependencies("gb_huawei_euleros_consolidation.nasl");
script_mandatory_keys("ssh/login/euleros", "ssh/login/rpms", re:"ssh/login/release=EULEROSVIRTARM64\-3\.0\.6\.0");
script_xref(name:"Advisory-ID", value:"EulerOS-SA-2020-1893");
script_xref(name:"URL", value:"https://developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html?secId=EulerOS-SA-2020-1893");
script_tag(name:"summary", value:"The remote host is missing an update for the Huawei EulerOS 'ntp' package(s) announced via the EulerOS-SA-2020-1893 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows remote attackers to cause a denial of service (daemon exit or system time change) by predicting transmit timestamps for use in spoofed packets. The victim must be relying on unauthenticated IPv4 time sources. There must be an off-path attacker who can query time from the victim's ntpd instance.(CVE-2020-13817)
ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a valid origin timestamp.(CVE-2020-11868)");
script_tag(name:"affected", value:"'ntp' package(s) on Huawei EulerOS Virtualization for ARM 64 3.0.6.0.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "EULEROSVIRTARM64-3.0.6.0") {
if(!isnull(res = isrpmvuln(pkg:"ntp", rpm:"ntp~4.2.8p12~1.h9.eulerosv2r8", rls:"EULEROSVIRTARM64-3.0.6.0"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"ntpdate", rpm:"ntpdate~4.2.8p12~1.h9.eulerosv2r8", rls:"EULEROSVIRTARM64-3.0.6.0"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"sntp", rpm:"sntp~4.2.8p12~1.h9.eulerosv2r8", rls:"EULEROSVIRTARM64-3.0.6.0"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo