SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   ntp Vendors:   ntp.org
(Oracle Issues Fix for Oracle Linux) ntp Multiple Flaws Let Remote Users Spoof Messages, Obtain Potentially Sensitive Information, and Deny Service
SecurityTracker Alert ID:  1034805
SecurityTracker URL:  http://securitytracker.com/id/1034805
CVE Reference:   CVE-2015-8138   (Links to External Site)
Date:  Jan 25 2016
Impact:   Denial of service via network, Disclosure of system information, Disclosure of user information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 4.2.8p6
Description:   Multiple vulnerabilities were reported in ntp. A remote user can cause denial of service conditions on the target system. A remote user can obtain potentially sensitive information on the target system. A remote user can impersonate ntp peers.

A remote user can conduct a replay attack against authenticated broadcast mode packets [CVE-2015-7973].

A remote authenticated user can exploit a key check flaw to impersonate a peer [CVE-2015-7974].

A remote user can send specially crafted data to trigger a buffer overflow in the nextvar() function in ntpq and cause the target service to crash [CVE-2015-7975].

A remote authenticated user can send an ntpq saveconfig command with specially crafted filename characters to cause unintended results [CVE-2015-7976].

A remote user can send a specially crafted ntpdc reslist command to trigger a null pointer dereference and cause the target service to crash [CVE-2015-7977].

A remote user can send a specially crafted reslist command to consume all available stack memory [CVE-2015-7978].

A remote user can send a specially crafted broadcast mode packet to cause the target broadcast client to tear down the association with the broadcast server [CVE-2015-7979].

A remote server can send a specially crafted packet with an origin timestamp of zero to bypass the timestamp validation check in certain cases [CVE-2015-8138].

A remote user can send specially crafted data to trigger an infinite loop in ntpq [CVE-2015-8158].

A remote user can trigger an origin leak in ntpq and ntpdc to obtain potentially sensitive information [CVE-2015-8139].

A remote user on the local network may be able to conduct replay attacks against ntpq [CVE-2015-8140].

Cisco ASIG reported these vulnerabilities.

Impact:   A remote user can cause denial of service conditions.

A remote user can obtain potentially sensitive information on the target system.

A remote authenticated user can impersonate an ntp peer.

Solution:   Oracle has issued a fix for CVE-2015-8138.

The Oracle Linux advisory is available at:

http://linux.oracle.com/errata/ELSA-2016-0063.html

Vendor URL:  linux.oracle.com/errata/ELSA-2016-0063.html (Links to External Site)
Cause:   Access control error, Authentication error, Boundary error
Underlying OS:  Linux (Oracle)
Underlying OS Comments:  6, 7

Message History:   This archive entry is a follow-up to the message listed below.
Jan 22 2016 ntp Multiple Flaws Let Remote Users Spoof Messages, Obtain Potentially Sensitive Information, and Deny Service



 Source Message Contents

Subject:  [El-errata] ELSA-2016-0063 Important: Oracle Linux 6 ntp security update

Oracle Linux Security Advisory ELSA-2016-0063

http://linux.oracle.com/errata/ELSA-2016-0063.html

The following updated rpms for Oracle Linux 6 have been uploaded to the 
Unbreakable Linux Network:

i386:
ntp-4.2.6p5-5.el6_7.4.i686.rpm
ntp-doc-4.2.6p5-5.el6_7.4.noarch.rpm
ntp-perl-4.2.6p5-5.el6_7.4.i686.rpm
ntpdate-4.2.6p5-5.el6_7.4.i686.rpm

x86_64:
ntp-4.2.6p5-5.el6_7.4.x86_64.rpm
ntp-doc-4.2.6p5-5.el6_7.4.noarch.rpm
ntp-perl-4.2.6p5-5.el6_7.4.x86_64.rpm
ntpdate-4.2.6p5-5.el6_7.4.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/ntp-4.2.6p5-5.el6_7.4.src.rpm



Description of changes:

[4.2.6p5-5.el6_7.4]
- don't accept server/peer packets with zero origin timestamp 
(CVE-2015-8138)


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC