[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2016-649 ---- ntp

ID: oval:org.secpod.oval:def:1600389Date: (C)2016-05-19   (M)2024-01-29
Class: PATCHFamily: unix




It was discovered that ntpd as a client did not correctly check the originate timestamp in received packets. A remote attacker could use this flaw to send a crafted packet to an ntpd client that would effectively disable synchronization with the server, or push arbitrary offset/delay measurements to modify the time on the client. A NULL pointer dereference flaw was found in the way ntpd processed "ntpdc reslist" commands that queried restriction lists with a large amount of entries. A remote attacker could use this flaw to crash the ntpd process. It was found that NTP does not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key. A stack-based buffer overflow was found in the way ntpd processed "ntpdc reslist" commands that queried restriction lists with a large amount of entries. A remote attacker could use this flaw to crash the ntpd process. It was found that when NTP is configured in broadcast mode, an off-path attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server. This could cause the time on affected clients to become out of sync over a longer period of time. A flaw was found in the way the ntpq client certain processed incoming packets in a loop in the getresponse function. A remote attacker could potentially use this flaw to crash an ntpq client instance

Platform:
Amazon Linux AMI
Product:
ntp
Reference:
ALAS-2016-649
CVE-2016-4953
CVE-2015-8158
CVE-2015-8138
CVE-2015-7979
CVE-2015-7978
CVE-2015-7977
CVE-2015-7974
CVE    7
CVE-2016-4953
CVE-2015-7978
CVE-2015-7977
CVE-2015-7979
...
CPE    96
cpe:/a:ntp:ntp:4.3.80
cpe:/a:ntp:ntp:4.3.84
cpe:/a:ntp:ntp:4.3.83
cpe:/a:ntp:ntp:4.3.82
...

© SecPod Technologies