Description: | Summary: NTP.org's reference implementation of NTP server, ntpd is prone to multiple denial of service vulnerabilities.
Vulnerability Insight: Multiple errors are due to:
- CVE-2015-7871 NAK to the Future: Symmetric association authentication bypass via crypto-NAK
- CVE-2015-7855 decodenetnum() will ASSERT botch instead of returning FAIL on some bogus values
- CVE-2015-7854 Password Length Memory Corruption Vulnerability
- CVE-2015-7853 Invalid length data provided by a custom refclock driver could cause a buffer overflow
- CVE-2015-7852 ntpq atoascii() Memory Corruption Vulnerability
- CVE-2015-7851 saveconfig Directory Traversal Vulnerability
- CVE-2015-7850 remote config logfile-keyfile
- CVE-2015-7849 trusted key use-after-free
- CVE-2015-7848 mode 7 loop counter underrun
- CVE-2015-7701 Slow memory leak in CRYPTO_ASSOC
- CVE-2015-7703 configuration directives 'pidfile' and 'driftfile' should only be allowed locally
- CVE-2015-7704, CVE-2015-7705 Clients that receive a KoD should validate the origin timestamp field
- CVE-2015-7691, CVE-2015-7692, CVE-2015-7702 Incomplete autokey data packet length checks
Vulnerability Impact: Successful exploitation will allow remote attackers to cause the application to crash, creating a denial-of-service condition.
Affected Software/OS: NTPd version 4.x prior to 4.2.8p4 and 4.3.0 prior to 4.3.77.
Solution: Update to version 4.2.8p4, 4.3.77 or later.
CVSS Score: 7.5
CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
|