Endless loop vulnerability in ntp-keygen in ntp for MD5 keys on big-endian machinesDeprecated |
ID: oval:org.secpod.oval:def:24535 | Date: (C)2015-06-04 (M)2023-02-20 |
Class: VULNERABILITY | Family: unix |
The host is installed with ntp version 4.2.6 and earlier on Redhat Enterprise Linux 6 or on Redhat Enterprise Linux 7 and is prone to an endless loop vulnerability. A flaw is present in the application, which fails to handle MD5 symmetric keys on big-endian systems. Successful exploitation could allow attackers to guess generated MD5 keys that could then be used to spoof an NTP client or server.
Platform: |
Red Hat Enterprise Linux 6 |
Red Hat Enterprise Linux 7 |