[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3223-1 ntp -- ntp

ID: oval:org.secpod.oval:def:602036Date: (C)2015-04-14   (M)2024-02-19
Class: PATCHFamily: unix




Multiple vulnerabilities were discovered in ntp, an implementation of the Network Time Protocol: CVE-2015-1798 When configured to use a symmetric key with an NTP peer, ntpd would accept packets without MAC as if they had a valid MAC. This could allow a remote attacker to bypass the packet authentication and send malicious packets without having to know the symmetric key. CVE-2015-1799 When peering with other NTP hosts using authenticated symmetric association, ntpd would update its internal state variables before the MAC of the NTP messages was validated. This could allow a remote attacker to cause a denial of service by impeding synchronization between NTP peers. Additionally, it was discovered that generating MD5 keys using ntp-keygen on big endian machines would either trigger an endless loop, or generate non-random keys.

Platform:
Debian 7.0
Product:
ntp
Reference:
DSA-3223-1
CVE-2015-1798
CVE-2015-1799
CVE    2
CVE-2015-1799
CVE-2015-1798
CPE    3
cpe:/a:ntp:ntp
cpe:/a:ntp:ntp:4.2.7p444
cpe:/o:debian:debian_linux:7.x

© SecPod Technologies