Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.150702
Category:General
Title:NTP < 4.2.8p15 DoS Vulnerability
Summary:Systems that use a CMAC algorithm in ntp.keys will not release a; bit of memory on each packet that uses a CMAC keyid, eventually causing ntpd to run out of memory; and fail. The CMAC cleanup introduced a bug whereby the CMAC data structure was no longer; completely removed.
Description:Summary:
Systems that use a CMAC algorithm in ntp.keys will not release a
bit of memory on each packet that uses a CMAC keyid, eventually causing ntpd to run out of memory
and fail. The CMAC cleanup introduced a bug whereby the CMAC data structure was no longer
completely removed.

Vulnerability Insight:
Please see the references for more information on the vulnerabilities.

Affected Software/OS:
NTPd version prior to 4.2.8p15, 4.3.x prior to version 4.3.101.

Solution:
Update to version 4.2.8p15, 4.3.101 or later.

CVSS Score:
4.0

CVSS Vector:
AV:N/AC:L/Au:S/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2020-15025
https://security.netapp.com/advisory/ntap-20200702-0002/
https://security.gentoo.org/glsa/202007-12
https://bugs.gentoo.org/729458
https://support.ntp.org/bin/view/Main/NtpBug3661
https://support.ntp.org/bin/view/Main/SecurityNotice#June_2020_ntp_4_2_8p15_NTP_Relea
https://www.oracle.com/security-alerts/cpujan2021.html
SuSE Security Announcement: openSUSE-SU-2020:0934 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html
SuSE Security Announcement: openSUSE-SU-2020:1007 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html
CopyrightCopyright (C) 2021 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.