Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Update for ntp RHSA-2015:1930-01
Summary:The remote host is missing an update for the 'ntp'; package(s) announced via the referenced advisory.
The remote host is missing an update for the 'ntp'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The Network Time Protocol (NTP) is used to synchronize a computer's time
with a referenced time source.

It was discovered that ntpd as a client did not correctly check timestamps
in Kiss-of-Death packets. A remote attacker could use this flaw to send a
crafted Kiss-of-Death packet to an ntpd client that would increase the
client's polling interval value, and effectively disable synchronization
with the server. (CVE-2015-7704)

It was found that ntpd did not correctly implement the threshold limitation
for the '-g' option, which is used to set the time without any
restrictions. A man-in-the-middle attacker able to intercept NTP traffic
between a connecting client and an NTP server could use this flaw to force
that client to make multiple steps larger than the panic threshold,
effectively changing the time to an arbitrary value. (CVE-2015-5300)

Red Hat would like to thank Aanchal Malhotra, Isaac E. Cohen, and Sharon
Goldberg of Boston University for reporting these issues.

All ntp users are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues. After installing the
update, the ntpd daemon will restart automatically.

Affected Software/OS:
ntp on Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Server (v. 7),
Red Hat Enterprise Linux Workstation (v. 6)

Please Install the Updated Packages.

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-5300
BugTraq ID: 77312
Debian Security Information: DSA-3388 (Google Search)
FreeBSD Security Advisory: FreeBSD-SA-16:02
RedHat Security Advisories: RHSA-2015:1930
SuSE Security Announcement: SUSE-SU:2016:1175 (Google Search)
SuSE Security Announcement: SUSE-SU:2016:1177 (Google Search)
SuSE Security Announcement: SUSE-SU:2016:1247 (Google Search)
SuSE Security Announcement: SUSE-SU:2016:1311 (Google Search)
SuSE Security Announcement: SUSE-SU:2016:1912 (Google Search)
SuSE Security Announcement: SUSE-SU:2016:2094 (Google Search)
SuSE Security Announcement: openSUSE-SU:2016:1292 (Google Search)
SuSE Security Announcement: openSUSE-SU:2016:1423 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2015-7704
BugTraq ID: 77280
CERT/CC vulnerability note: VU#718152
RedHat Security Advisories: RHSA-2015:2520
CopyrightCopyright (C) 2015 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.