Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.120060
Category:Amazon Linux Local Security Checks
Title:Amazon Linux: Security Advisory (ALAS-2015-520)
Summary:The remote host is missing an update for the 'ntp' package(s) announced via the ALAS-2015-520 advisory.
Description:Summary:
The remote host is missing an update for the 'ntp' package(s) announced via the ALAS-2015-520 advisory.

Vulnerability Insight:
The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p2 requires a correct MAC only if the MAC field has a nonzero length, which makes it easier for man-in-the-middle attackers to spoof packets by omitting the MAC. (CVE-2015-1798)

The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer. (CVE-2015-1799)

This update also addresses leap-second handling. With older ntp versions, the -x option was sometimes used as a workaround to avoid kernel inserting/deleting leap seconds by stepping the clock and possibly upsetting running applications. That no longer works with 4.2.6 as ntpd steps the clock itself when a leap second occurs. The fix is to treat the one second offset gained during leap second as a normal offset and check the stepping threshold (set by -x or tinker step) to decide if a step should be applied. See this forum post for more information on the Amazon Linux AMI's leap-second handling.

Affected Software/OS:
'ntp' package(s) on Amazon Linux.

Solution:
Please install the updated package(s).

CVSS Score:
4.3

CVSS Vector:
AV:A/AC:M/Au:N/C:N/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-1798
1032032
http://www.securitytracker.com/id/1032032
20150408 Multiple Vulnerabilities in ntpd (April 2015) Affecting Cisco Products
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-ntpd
20150408 Network Time Protocol Daemon MAC Checking Failure Authentication Bypass Vulnerability
http://tools.cisco.com/security/center/viewAlert.x?alertId=38276
73951
http://www.securityfocus.com/bid/73951
APPLE-SA-2015-06-30-2
http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
DSA-3223
http://www.debian.org/security/2015/dsa-3223
FEDORA-2015-5761
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155864.html
FEDORA-2015-5874
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155863.html
GLSA-201509-01
https://security.gentoo.org/glsa/201509-01
HPSBUX03333
http://marc.info/?l=bugtraq&m=143213867103400&w=2
MDVSA-2015:202
http://www.mandriva.com/security/advisories?name=MDVSA-2015:202
RHSA-2015:1459
http://rhn.redhat.com/errata/RHSA-2015-1459.html
SSRT102029
USN-2567-1
http://www.ubuntu.com/usn/USN-2567-1
VU#374268
http://www.kb.cert.org/vuls/id/374268
http://bugs.ntp.org/show_bug.cgi?id=2779
http://support.apple.com/kb/HT204942
http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
https://kc.mcafee.com/corporate/index?page=content&id=SB10114
openSUSE-SU-2015:0775
http://lists.opensuse.org/opensuse-updates/2015-04/msg00052.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-1799
1032031
http://www.securitytracker.com/id/1032031
20150408 Network Time Protocol Daemon Symmetric Mode Packet Processing Denial of Service Vulnerability
http://tools.cisco.com/security/center/viewAlert.x?alertId=38275
73950
http://www.securityfocus.com/bid/73950
DSA-3222
http://www.debian.org/security/2015/dsa-3222
HPSBHF03557
http://marc.info/?l=bugtraq&m=145750740530849&w=2
[chrony-announce] 20150407 chrony-1.31.1 released (security)
http://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2015/04/msg00002.html
http://bugs.ntp.org/show_bug.cgi?id=2781
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.