Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Update for ntp RHSA-2015:2231-04
Summary:The remote host is missing an update for the 'ntp'; package(s) announced via the referenced advisory.
The remote host is missing an update for the 'ntp'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The Network Time Protocol (NTP) is used to
synchronize a computer's time with another referenced time source. These packages
include the ntpd service which continuously adjusts system time and utilities
used to query and configure the ntpd service.

It was found that because NTP's access control was based on a source IP
address, an attacker could bypass source IP restrictions and send
malicious control and configuration packets by spoofing ::1 addresses.
(CVE-2014-9298, CVE-2014-9751)

A denial of service flaw was found in the way NTP hosts that were peering
with each other authenticated themselves before updating their internal
state variables. An attacker could send packets to one peer host, which
could cascade to other peers, and stop the synchronization process among
the reached peers. (CVE-2015-1799)

A flaw was found in the way the ntp-keygen utility generated MD5 symmetric
keys on big-endian systems. An attacker could possibly use this flaw to
guess generated MD5 keys, which could then be used to spoof an NTP client
or server. (CVE-2015-3405)

A stack-based buffer overflow was found in the way the NTP autokey protocol
was implemented. When an NTP client decrypted a secret received from an NTP
server, it could cause that client to crash. (CVE-2014-9297, CVE-2014-9750)

It was found that ntpd did not check whether a Message Authentication Code
(MAC) was present in a received packet when ntpd was configured to use
symmetric cryptographic keys. A man-in-the-middle attacker could use this
flaw to send crafted packets that would be accepted by a client or a peer
without the attacker knowing the symmetric key. (CVE-2015-1798)

The CVE-2015-1798 and CVE-2015-1799 issues were discovered by Miroslav
Lichvar of Red Hat.

Bug fixes:

* The ntpd service truncated symmetric keys specified in the key file to 20
bytes. As a consequence, it was impossible to configure NTP authentication
to work with peers that use longer keys. With this update, the maximum key
length has been changed to 32 bytes. (BZ#1191111)

* The ntpd service could previously join multicast groups only when
starting, which caused problems if ntpd was started during system boot
before network was configured. With this update, ntpd attempts to join
multicast groups every time network configuration is changed. (BZ#1207014)

* Previously, the ntp-keygen utility used the exponent of 3 when generating
RSA keys. Consequently, generating RSA keys failed when FIPS mode was
enabled. With this update, ntp-keygen has been modified to use the exponent
of 65537, and generating keys in FIPS mode now works as expected.
(BZ#11 ...

Description truncated, please see the referenced URL(s) for more information.

Affected Software/OS:
ntp on Red Hat Enterprise Linux Server (v. 7)

Please Install the Updated Packages.

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-9297
Common Vulnerability Exposure (CVE) ID: CVE-2014-9298
Common Vulnerability Exposure (CVE) ID: CVE-2014-9750
BugTraq ID: 72583
CERT/CC vulnerability note: VU#852879
Debian Security Information: DSA-3388 (Google Search)
RedHat Security Advisories: RHSA-2015:1459
Common Vulnerability Exposure (CVE) ID: CVE-2014-9751
BugTraq ID: 72584
Common Vulnerability Exposure (CVE) ID: CVE-2015-1798
BugTraq ID: 73951
CERT/CC vulnerability note: VU#374268
Cisco Security Advisory: 20150408 Multiple Vulnerabilities in ntpd (April 2015) Affecting Cisco Products
Cisco Security Advisory: 20150408 Network Time Protocol Daemon MAC Checking Failure Authentication Bypass Vulnerability
Debian Security Information: DSA-3223 (Google Search)
HPdes Security Advisory: HPSBUX03333
HPdes Security Advisory: SSRT102029
SuSE Security Announcement: openSUSE-SU-2015:0775 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2015-1799
BugTraq ID: 73950
Cisco Security Advisory: 20150408 Network Time Protocol Daemon Symmetric Mode Packet Processing Denial of Service Vulnerability
Debian Security Information: DSA-3222 (Google Search)
HPdes Security Advisory: HPSBHF03557
Common Vulnerability Exposure (CVE) ID: CVE-2015-3405
BugTraq ID: 74045
RedHat Security Advisories: RHSA-2015:2231
SuSE Security Announcement: SUSE-SU-2015:1173 (Google Search)
CopyrightCopyright (C) 2015 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.