Lucene search

K
talosTalos IntelligenceTALOS-2015-0062
HistoryOct 21, 2015 - 12:00 a.m.

Network Time Protocol ntpd saveconfig Directory Traversal Vulnerability

2015-10-2100:00:00
Talos Intelligence
www.talosintelligence.com
51

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

3.5 Low

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

55.3%

Talos Vulnerability Report

TALOS-2015-0062

Network Time Protocol ntpd saveconfig Directory Traversal Vulnerability

October 21, 2015
CVE Number

CVE-2015-7851

Description

A potential path traversal vulnerability exists in the config file saving of ntpd on VMS. A specially crafted path could cause a path traversal potentially resulting in files being overwritten. An attacker could provide a malicious path to trigger this vulnerability.

Tested Versions

ntp 4.2.8p2

Product URLs

<http://www.ntp.org>

Details

The function save_config in the file ntp_control.c will perform path sanitization by stripping out ‘\’ and ‘/’ from the filename provided to ensure that a user does not save files outside of the saveconfigdir that was previously configured.

if (strchr(filename, '\\') || strchr(filename, '/')) {
        snprintf(reply, sizeof(reply),
             "saveconfig does not allow directory in filename");
        ctl_putdata(reply, strlen(reply), 0);
        ctl_flushpkt(0);
        msyslog(LOG_NOTICE,
            "saveconfig with path from %s rejected",
            stoa(&rbufp-&gt;recv_srcadr));
        return;
    }

However on operating systems such as OpenVMS, directory separation is not done by using ‘\’ or ‘/’ but instead by characters such as ‘.’, ’-‘ and ‘:’.

Credit

Yves Younan of Cisco Talos


Vulnerability Reports Next Report

TALOS-2015-0063

Previous Report

TALOS-2015-0055

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

3.5 Low

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

55.3%