SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   ntp Vendors:   ntp.org
(Oracle Issues Fix for Oracle Linux) ntp Bugs Let Remote Users Deny Service, Obtain Potentially Sensitive Information, and Bypass Access Controls in Certain Cases
SecurityTracker Alert ID:  1034233
SecurityTracker URL:  http://securitytracker.com/id/1034233
CVE Reference:   CVE-2014-9750, CVE-2014-9751   (Links to External Site)
Date:  Nov 24 2015
Impact:   Denial of service via network, Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 4.2.8p1
Description:   Two vulnerabilities were reported in ntp. A remote user can cause denial of service conditions. A remote user can obtain potentially sensitive information. A remote user can bypass access controls in certain cases.

A remote user can send a specially crafted 'vallen' parameter value to trigger a validation flaw in 'ntp_crypto.c' and obtain potentially sensitive information or cause the target ntpd service to crash [CVE-2014-9750].

Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team, and Harlan Stenn of Network Time Foundation reported this vulnerability.

A remote user may be able to spoof the ::1 source address via IPv6 to bypass IPv6-based access controls [CVE-2014-9751]. Some operating systems are affected, including Apple OS X and Linux.

Stephen Roettger of the Google Security Team reported this vulnerability.

Impact:   A remote user can cause denial of service conditions.

A remote user can obtain potentially sensitive information.

A remote user can bypass access controls in certain cases.

Solution:   Oracle has issued a fix.

The Oracle Linux advisory is available at:

http://linux.oracle.com/errata/ELSA-2015-2231.html

Vendor URL:  linux.oracle.com/errata/ELSA-2015-2231.html (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Oracle)
Underlying OS Comments:  7

Message History:   This archive entry is a follow-up to the message listed below.
Feb 16 2015 ntp Bugs Let Remote Users Deny Service, Obtain Potentially Sensitive Information, and Bypass Access Controls in Certain Cases



 Source Message Contents

Subject:  [El-errata] ELSA-2015-2231 Moderate: Oracle Linux 7 ntp security, bug fix, and enhancement update

Oracle Linux Security Advisory ELSA-2015-2231

http://linux.oracle.com/errata/ELSA-2015-2231.html

The following updated rpms for Oracle Linux 7 have been uploaded to the 
Unbreakable Linux Network:

x86_64:
ntp-4.2.6p5-22.el7.x86_64.rpm
ntp-doc-4.2.6p5-22.el7.noarch.rpm
ntp-perl-4.2.6p5-22.el7.noarch.rpm
ntpdate-4.2.6p5-22.el7.x86_64.rpm
sntp-4.2.6p5-22.el7.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/ntp-4.2.6p5-22.el7.src.rpm



Description of changes:

[4.2.6p5-22]
- check origin timestamp before accepting KoD RATE packet (CVE-2015-7704)
- allow only one step larger than panic threshold with -g (CVE-2015-5300)

[4.2.6p5-20]
- validate lengths of values in extension fields (CVE-2014-9297)
- drop packets with spoofed source address ::1 (CVE-2014-9298)
- reject packets without MAC when authentication is enabled (CVE-2015-1798)
- protect symmetric associations with symmetric key against DoS attack 
(CVE-2015-1799)
- fix generation of MD5 keys with ntp-keygen on big-endian systems 
(CVE-2015-3405)
- add option to set Differentiated Services Code Point (DSCP) (#1202828)
- add nanosecond support to SHM refclock (#1117702)
- allow creating all SHM segments with owner-only access (#1122012)
- allow different thresholds for forward and backward step (#1193154)
- allow symmetric keys up to 32 bytes again (#1191111)
- don't step clock for leap second with -x option (#1191122)
- don't drop packets with source port below 123 (#1171640)
- retry joining multicast groups (#1207014)
- increase memlock limit again (#1053569)
- warn when monitor can't be disabled due to limited restrict (#1191108)
- use larger RSA exponent in ntp-keygen (#1191116)
- fix crash in ntpq mreadvar command (#1180721)
- move sntp kod database to allow SELinux labeling (#1082934)
- fix typos in ntpd man page (#1195211)
- improve documentation of restrict command (#1213953)


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC