Lucene search

K
redhatcveRedhat.comRH:CVE-2021-3571
HistoryJul 06, 2021 - 3:18 p.m.

CVE-2021-3571

2021-07-0615:18:12
redhat.com
access.redhat.com
43

0.003 Low

EPSS

Percentile

69.1%

A flaw was found in the ptp4l program of the linuxptp package. When ptp4l is operating on a little-endian architecture as a PTP transparent clock, a remote attacker could send a crafted one-step sync message to cause an information leak or crash. The highest threat from this vulnerability is to data confidentiality and system availability.

Mitigation

Only attackers that can connect to the ptp4l service can exploit this vulnerability. If ptp4l is bound only to a private network interface, or is protected by firewall rules to block incoming PTP management messages, the attack surface is correspondingly limited. When using the UDP IPv4 or IPv6 network transport, the following tcpdump filter can be used to detect PTP management messages:

(port 319 or port 320) and udp[8]&0xf=0xd