Lucene search

K
osvGoogleOSV:DSA-3223-1
HistoryApr 12, 2015 - 12:00 a.m.

ntp - security update

2015-04-1200:00:00
Google
osv.dev
38

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

Multiple vulnerabilities were discovered in ntp, an implementation of the
Network Time Protocol:

  • CVE-2015-1798
    When configured to use a symmetric key with an NTP peer, ntpd would
    accept packets without MAC as if they had a valid MAC. This could
    allow a remote attacker to bypass the packet authentication and send
    malicious packets without having to know the symmetric key.
  • CVE-2015-1799
    When peering with other NTP hosts using authenticated symmetric
    association, ntpd would update its internal state variables before
    the MAC of the NTP messages was validated. This could allow a remote
    attacker to cause a denial of service by impeding synchronization
    between NTP peers.

Additionally, it was discovered that generating MD5 keys using ntp-keygen
on big endian machines would either trigger an endless loop, or generate
non-random keys.

For the stable distribution (wheezy), these problems have been fixed in
version 1:4.2.6.p5+dfsg-2+deb7u4.

For the unstable distribution (sid), these problems have been fixed in
version 1:4.2.6.p5+dfsg-7.

We recommend that you upgrade your ntp packages.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N