Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2023.2609.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2023:2609-1)
Summary:The remote host is missing an update for the 'ntp' package(s) announced via the SUSE-SU-2023:2609-1 advisory.
Description:Summary:
The remote host is missing an update for the 'ntp' package(s) announced via the SUSE-SU-2023:2609-1 advisory.

Vulnerability Insight:
This update for ntp fixes the following issues:

ntp was updated to 4.2.8p17:

* Fix some regressions of 4.2.8p16

Update to 4.2.8p16:

* [Sec 3808] Assertion failure in ntpq on malformed RT-11 date
* [Sec 3807], bsc#1210390, CVE-2023-26555:
praecis_parse() in the Palisade refclock driver has a
hypothetical input buffer overflow.
* [Sec 3767] An OOB KoD RATE value triggers an assertion when
debug is enabled.
* Multiple bug fixes and improvements. For details, see /usr/share/doc/packages/ntp/ChangeLog

[link moved to references]

- CVE-2023-26555: Fixed assertion failure on malformed RT-11 dates (bsc#1210390).

Affected Software/OS:
'ntp' package(s) on SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server for SAP Applications 12-SP5.

Solution:
Please install the updated package(s).

CVSS Score:
6.2

CVSS Vector:
AV:L/AC:H/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2023-26555
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IY2SVYH4MKPAXEYHCCXD3Z6VGINLSVHK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3VHEHHWCTYSB7HVJLYPVK4RPJZ5LX52/
https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26555
https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#issuecomment-1506546409
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.