Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.122754
Category:Oracle Linux Local Security Checks
Title:Oracle: Security Advisory (ELSA-2015-2231)
Summary:The remote host is missing an update for the 'ntp' package(s) announced via the ELSA-2015-2231 advisory.
Description:Summary:
The remote host is missing an update for the 'ntp' package(s) announced via the ELSA-2015-2231 advisory.

Vulnerability Insight:
[4.2.6p5-22]
- check origin timestamp before accepting KoD RATE packet (CVE-2015-7704)
- allow only one step larger than panic threshold with -g (CVE-2015-5300)

[4.2.6p5-20]
- validate lengths of values in extension fields (CVE-2014-9297)
- drop packets with spoofed source address ::1 (CVE-2014-9298)
- reject packets without MAC when authentication is enabled (CVE-2015-1798)
- protect symmetric associations with symmetric key against DoS attack (CVE-2015-1799)
- fix generation of MD5 keys with ntp-keygen on big-endian systems (CVE-2015-3405)
- add option to set Differentiated Services Code Point (DSCP) (#1202828)
- add nanosecond support to SHM refclock (#1117702)
- allow creating all SHM segments with owner-only access (#1122012)
- allow different thresholds for forward and backward step (#1193154)
- allow symmetric keys up to 32 bytes again (#1191111)
- don't step clock for leap second with -x option (#1191122)
- don't drop packets with source port below 123 (#1171640)
- retry joining multicast groups (#1207014)
- increase memlock limit again (#1053569)
- warn when monitor can't be disabled due to limited restrict (#1191108)
- use larger RSA exponent in ntp-keygen (#1191116)
- fix crash in ntpq mreadvar command (#1180721)
- move sntp kod database to allow SELinux labeling (#1082934)
- fix typos in ntpd man page (#1195211)
- improve documentation of restrict command (#1213953)

Affected Software/OS:
'ntp' package(s) on Oracle Linux 7.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-9297
Common Vulnerability Exposure (CVE) ID: CVE-2014-9298
Common Vulnerability Exposure (CVE) ID: CVE-2014-9750
BugTraq ID: 72583
http://www.securityfocus.com/bid/72583
CERT/CC vulnerability note: VU#852879
http://www.kb.cert.org/vuls/id/852879
Debian Security Information: DSA-3388 (Google Search)
http://www.debian.org/security/2015/dsa-3388
RedHat Security Advisories: RHSA-2015:1459
http://rhn.redhat.com/errata/RHSA-2015-1459.html
Common Vulnerability Exposure (CVE) ID: CVE-2014-9751
BugTraq ID: 72584
http://www.securityfocus.com/bid/72584
Common Vulnerability Exposure (CVE) ID: CVE-2015-1798
1032032
http://www.securitytracker.com/id/1032032
20150408 Multiple Vulnerabilities in ntpd (April 2015) Affecting Cisco Products
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-ntpd
20150408 Network Time Protocol Daemon MAC Checking Failure Authentication Bypass Vulnerability
http://tools.cisco.com/security/center/viewAlert.x?alertId=38276
73951
http://www.securityfocus.com/bid/73951
APPLE-SA-2015-06-30-2
http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
DSA-3223
http://www.debian.org/security/2015/dsa-3223
FEDORA-2015-5761
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155864.html
FEDORA-2015-5874
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155863.html
GLSA-201509-01
https://security.gentoo.org/glsa/201509-01
HPSBUX03333
http://marc.info/?l=bugtraq&m=143213867103400&w=2
MDVSA-2015:202
http://www.mandriva.com/security/advisories?name=MDVSA-2015:202
RHSA-2015:1459
SSRT102029
USN-2567-1
http://www.ubuntu.com/usn/USN-2567-1
VU#374268
http://www.kb.cert.org/vuls/id/374268
http://bugs.ntp.org/show_bug.cgi?id=2779
http://support.apple.com/kb/HT204942
http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
https://kc.mcafee.com/corporate/index?page=content&id=SB10114
openSUSE-SU-2015:0775
http://lists.opensuse.org/opensuse-updates/2015-04/msg00052.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-1799
1032031
http://www.securitytracker.com/id/1032031
20150408 Network Time Protocol Daemon Symmetric Mode Packet Processing Denial of Service Vulnerability
http://tools.cisco.com/security/center/viewAlert.x?alertId=38275
73950
http://www.securityfocus.com/bid/73950
DSA-3222
http://www.debian.org/security/2015/dsa-3222
HPSBHF03557
http://marc.info/?l=bugtraq&m=145750740530849&w=2
[chrony-announce] 20150407 chrony-1.31.1 released (security)
http://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2015/04/msg00002.html
http://bugs.ntp.org/show_bug.cgi?id=2781
Common Vulnerability Exposure (CVE) ID: CVE-2015-3405
74045
http://www.securityfocus.com/bid/74045
DSA-3388
FEDORA-2015-5830
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156248.html
RHSA-2015:2231
http://rhn.redhat.com/errata/RHSA-2015-2231.html
SUSE-SU-2015:1173
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00000.html
[oss-security] 20150423 Re: CVE request: ntp-keygen may generate non-random symmetric keys on big-endian systems
http://www.openwall.com/lists/oss-security/2015/04/23/14
http://bk1.ntp.org/ntp-stable/?PAGE=patch&REV=55199296N2gFqH1Hm5GOnhrk9Ypygg
https://bugs.ntp.org/show_bug.cgi?id=2797
https://bugzilla.redhat.com/show_bug.cgi?id=1210324
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03886en_us
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.