SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Intrusion Detection)  >   Cisco Intrusion Prevention System Vendors:   Cisco
(Cisco Issues Advisory for Cisco Intrusion Prevention System) Ntpd Symmetric Mode Packet Processing Flaw Lets Remote Users Deny Service
SecurityTracker Alert ID:  1032070
SecurityTracker URL:  http://securitytracker.com/id/1032070
CVE Reference:   CVE-2015-1799   (Links to External Site)
Date:  Apr 10 2015
Impact:   Denial of service via network
Vendor Confirmed:  Yes  Exploit Included:  Yes  

Description:   A vulnerability was reported in Ntpd. A remote user can cause denial of service conditions on the target system. Cisco Intrusion Prevention System is affected.

A remote user with knowledge of a symmetric association between two hosts can periodically send a specially crafted packet to one host of the symmetric association to cause both hosts to fail to synchronize.

Systems that are configured to use symmetric key authentication are affected.

Miroslav Lichvar of Red Hat reported this vulnerability.

Impact:   A remote user can cause two hosts of a symmetric association to fail to synchronize.
Solution:   Cisco has issued an advisory for Cisco Intrusion Prevention System.

Cisco has assigned bug ID CSCut77568 to this vulnerability.

The Cisco advisory is available at:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-ntpd

Vendor URL:  support.ntp.org/bin/view/Main/SecurityNotice#Authentication_doesn_t_protect_s (Links to External Site)
Cause:   State error

Message History:   This archive entry is a follow-up to the message listed below.
Apr 7 2015 Ntpd Symmetric Mode Packet Processing Flaw Lets Remote Users Deny Service



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC