[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ELSA-2015-1459 -- Oracle ntp

ID: oval:org.secpod.oval:def:1501086Date: (C)2015-08-03   (M)2024-02-19
Class: PATCHFamily: unix




Multiple vulnerabilities were discovered in ntp, an implementation of the Network Time Protocol: CVE-2015-1798 When configured to use a symmetric key with an NTP peer, ntpd would accept packets without MAC as if they had a valid MAC. This could allow a remote attacker to bypass the packet authentication and send malicious packets without having to know the symmetric key. CVE-2015-1799 When peering with other NTP hosts using authenticated symmetric association, ntpd would update its internal state variables before the MAC of the NTP messages was validated. This could allow a remote attacker to cause a denial of service by impeding synchronization between NTP peers. Additionally, it was discovered that generating MD5 keys using ntp-keygen on big endian machines would either trigger an endless loop, or generate non-random keys.

Platform:
Oracle Linux 6
Product:
ntp
Reference:
ELSA-2015-1459
CVE-2015-1798
CVE-2015-1799
CVE-2015-3405
CVE-2014-9750
CVE-2014-9751
CVE    5
CVE-2014-9751
CVE-2014-9750
CVE-2015-3405
CVE-2015-1799
...
CPE    16
cpe:/a:ntp:ntp
cpe:/a:ntp:ntp:4.2.8:p2
cpe:/o:oracle:linux:6
cpe:/a:ntp:ntp:4.2.8:p1
...

© SecPod Technologies