[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2015-593 --- ntp

ID: oval:org.secpod.oval:def:1200153Date: (C)2016-01-04   (M)2024-01-29
Class: PATCHFamily: unix




As discussed upstream, a flaw was found in the way ntpd processed certain remote configuration packets. Note that remote configuration is disabled by default in NTP. It was found that the :config command can be used to set the pidfile and driftfile paths without any restrictions. A remote attacker could use this flaw to overwrite a file on the file system with a file containing the pid of the ntpd process or the current estimated drift of the system clock . It was found that ntpd could crash due to an uninitialized variable when processing malformed logconfig configuration commands. It was found that ntpd exits with a segmentation fault when a statistics type that was not enabled during compilation is referenced by the statistics or filegen configuration command. It was discovered that sntp would hang in an infinite loop when a crafted NTP packet was received, related to the conversion of the precision value in the packet to double. A flaw was found in the way the ntp-keygen utility generated MD5 symmetric keys on big-endian systems. An attacker could possibly use this flaw to guess generated MD5 keys, which could then be used to spoof an NTP client or server

Platform:
Amazon Linux AMI
Product:
ntp
Reference:
ALAS-2015-593
CVE-2015-5146
CVE-2015-7703
CVE-2015-5194
CVE-2015-5195
CVE-2015-5219
CVE-2015-3405
CVE    6
CVE-2015-7703
CVE-2015-5219
CVE-2015-5194
CVE-2015-5195
...
CPE    2
cpe:/o:amazon:linux
cpe:/a:ntp:ntp

© SecPod Technologies