(Oracle Issues Fix for Oracle Linux) ntp Multiple Flaws Let Remote Users Spoof Messages, Obtain Potentially Sensitive Information, and Deny Service
SecurityTracker Alert ID: 1036004|
SecurityTracker URL: http://securitytracker.com/id/1036004
(Links to External Site)
Date: Jun 1 2016
Denial of service via network, Disclosure of system information, Disclosure of user information, Modification of user information|
Fix Available: Yes Vendor Confirmed: Yes |
Version(s): prior to 4.2.8p6|
Multiple vulnerabilities were reported in ntp. A remote user can cause denial of service conditions on the target system. A remote user can obtain potentially sensitive information on the target system. A remote user can impersonate ntp peers.|
A remote user can conduct a replay attack against authenticated broadcast mode packets [CVE-2015-7973].
A remote authenticated user can exploit a key check flaw to impersonate a peer [CVE-2015-7974].
A remote user can send specially crafted data to trigger a buffer overflow in the nextvar() function in ntpq and cause the target service to crash [CVE-2015-7975].
A remote authenticated user can send an ntpq saveconfig command with specially crafted filename characters to cause unintended results [CVE-2015-7976].
A remote user can send a specially crafted ntpdc reslist command to trigger a null pointer dereference and cause the target service to crash [CVE-2015-7977].
A remote user can send a specially crafted reslist command to consume all available stack memory [CVE-2015-7978].
A remote user can send a specially crafted broadcast mode packet to cause the target broadcast client to tear down the association with the broadcast server [CVE-2015-7979].
A remote server can send a specially crafted packet with an origin timestamp of zero to bypass the timestamp validation check in certain cases [CVE-2015-8138].
A remote user can send specially crafted data to trigger an infinite loop in ntpq [CVE-2015-8158].
A remote user can trigger an origin leak in ntpq and ntpdc to obtain potentially sensitive information [CVE-2015-8139].
A remote user on the local network may be able to conduct replay attacks against ntpq [CVE-2015-8140].
Cisco ASIG reported these vulnerabilities.
A remote user can cause denial of service conditions.|
A remote user can obtain potentially sensitive information on the target system.
A remote authenticated user can impersonate an ntp peer.
Oracle has issued a fix for CVE-2015-7979.|
The Oracle Linux advisory is available at:
Vendor URL: linux.oracle.com/errata/ELSA-2016-1141.html (Links to External Site)
Access control error, Authentication error, Boundary error|
|Underlying OS: Linux (Oracle)|
|Underlying OS Comments: 6, 7|
This archive entry is a follow-up to the message listed below.|
Source Message Contents
Subject: [El-errata] ELSA-2016-1141 Moderate: Oracle Linux 7 ntp security update|
Oracle Linux Security Advisory ELSA-2016-1141
The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:
Description of changes:
- don't allow spoofed packets to demobilize associations (CVE-2015-7979,
- don't allow spoofed packet to enable symmetric interleaved mode
- check mode of new source in config command (CVE-2016-2518)
- make MAC check resilient against timing attack (CVE-2016-1550)
El-errata mailing list