SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Intrusion Detection)  >   Cisco Intrusion Prevention System Vendors:   Cisco
(Cisco Issues Advisory for Cisco Intrusion Prevention System) Ntpd MAC Checking Failure Lets Remote Users Bypass Authentication
SecurityTracker Alert ID:  1032069
SecurityTracker URL:  http://securitytracker.com/id/1032069
CVE Reference:   CVE-2015-1798   (Links to External Site)
Date:  Apr 10 2015
Impact:   Host/resource access via network
Vendor Confirmed:  Yes  Exploit Included:  Yes  

Description:   A vulnerability was reported in Ntpd. A remote user can bypass authentication on the target system. Cisco Intrusion Prevention System is affected.

When configured for symmetric key authentication, the system accepts packets that do not contain a message authentication code (MAC) as valid packets. A remote user with the ability to conduct a man-in-the-middle attack can send a specially crafted spoofed packet that does not contain a MAC value to bypass authentication.

Authentication using autokey is not affected.

Miroslav Lichvar of Red Hat reported this vulnerability.

Impact:   A remote user can bypass authentication on the target system.
Solution:   Cisco has issued an advisory for Cisco Intrusion Prevention System.

Cisco has assigned bug ID CSCut77568 to this vulnerability.

The Cisco advisory is available at:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-ntpd

Vendor URL:  support.ntp.org/bin/view/Main/SecurityNotice#ntpd_accepts_unauthenticated_pac (Links to External Site)
Cause:   Authentication error

Message History:   This archive entry is a follow-up to the message listed below.
Apr 7 2015 Ntpd MAC Checking Failure Lets Remote Users Bypass Authentication



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC