(Juniper Issues Advisory for Juniper Junos) ntp Multiple Flaws Let Remote Users Deny Service, View Files, and Bypass Authentication to Modify the Time
|
SecurityTracker Alert ID: 1034020 |
SecurityTracker URL: http://securitytracker.com/id/1034020
|
CVE Reference:
CVE-2015-7691, CVE-2015-7692, CVE-2015-7701, CVE-2015-7702, CVE-2015-7703, CVE-2015-7704, CVE-2015-7705, CVE-2015-7848, CVE-2015-7849, CVE-2015-7850, CVE-2015-7851, CVE-2015-7852, CVE-2015-7853, CVE-2015-7854, CVE-2015-7855, CVE-2015-7871
(Links to External Site)
|
Date: Oct 29 2015
|
Impact:
Denial of service via network, Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information
|
Vendor Confirmed: Yes
|
|
Description:
Multiple vulnerabilities were reported in ntp. A remote user can view files on the target system. A remote user can cause denial of service conditions on the target system. A remote user can bypass authentication. A remote user can modify the time on the target system. Juniper Junos is affected.
A remote user can trigger a memory leak in CRYPTO_ASSOC [CVE-2015-7701].
A remote user can send AutoKey messages with a specially crafted AutoKey data packet length value to cause denial of service conditions [CVE-2015-7691, CVE-2015-7692, CVE-2015-7702].
A remote user can overwrite "pidfile" and "driftfile" configuration file directives [CVE-2015-7703].
A remote user can supply specially crafted data to cause denial of service conditions [CVE-2015-7704, CVE-2015-7705].
A remote user can trigger a mode 7 loop counter integer overflow in ntpd [CVE-2015-7848].
A remote user can trigger a use-after-free memory error in the processing of trusted keys [CVE-2015-7849].
A remote user can exploit a logfile-keyfile configuration flaw to cause denial of service conditions [CVE-2015-7850].
A remote user can exploit a directory traversal flaw in ntpd saveconfig [CVE-2015-7851].
A remote user can trigger a memory corruption error in the ntpq atoascii() function [CVE-2015-7852].
A remote user can supply specially crafted reference clock data to trigger a buffer overflow [CVE-2015-7853].
A remote user can supply a specially crafted password value to trigger a memory corruption error [CVE-2015-7854].
A remote user can send a specially crafted control packet message to exploit a flaw in decodenetnum() to cause denial of service conditions [CVE-2015-7855].
A remote user can exploit a flaw in the crypto-NAK() function to bypass symmetric association authentication [CVE-2015-7871].
Cisco ASIG, IDA, Cisco TALOS, Tenable, RedHat, OpenVMS, and Boston University reported these vulnerabilities.
|
Impact:
A remote user can modify time on the target system.
A remote user can view files on the target system.
A remote user can cause denial of service conditions.
A remote user can bypass authentication on the target system.
|
Solution:
No solution was available at the time of this entry.
Juniper Junos is affected when NTP is enabled within the [edit system ntp] hierarchy level of the Junos configuration.
Juniper has assigned PR 1132181 to this vulnerability.
The Juniper advisory is available at:
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10711
|
Vendor URL: kb.juniper.net/InfoCenter/index?page=content&id=JSA10711 (Links to External Site)
|
Cause:
Access control error, Boundary error, Input validation error
|
|
Message History:
This archive entry is a follow-up to the message listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|