SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Firewall)  >   Palo Alto PAN-OS Vendors:   Palo Alto Networks
(Palo Alto Networks Issues Fix for Palo Alto PAN-OS) ntp Multiple Flaws Let Remote Users Spoof Messages, Obtain Potentially Sensitive Information, and Deny Service
SecurityTracker Alert ID:  1036665
SecurityTracker URL:  http://securitytracker.com/id/1036665
CVE Reference:   CVE-2015-7973, CVE-2015-7974, CVE-2015-7975, CVE-2015-7976, CVE-2015-7977, CVE-2015-7978, CVE-2015-7979, CVE-2015-8138, CVE-2015-8158   (Links to External Site)
Date:  Aug 19 2016
Impact:   Denial of service via network, Disclosure of system information, Disclosure of user information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5.0.X, 5.1.X, 6.0.X, 6.1.12 and prior, 7.0.8 and prior, 7.1.3 and prior
Description:   Multiple vulnerabilities were reported in ntp. A remote user can cause denial of service conditions on the target system. A remote user can obtain potentially sensitive information on the target system. A remote user can impersonate ntp peers. Palo Alto PAN-OS is affected.

A remote user can conduct a replay attack against authenticated broadcast mode packets [CVE-2015-7973].

A remote authenticated user can exploit a key check flaw to impersonate a peer [CVE-2015-7974].

A remote user can send specially crafted data to trigger a buffer overflow in the nextvar() function in ntpq and cause the target service to crash [CVE-2015-7975].

A remote authenticated user can send an ntpq saveconfig command with specially crafted filename characters to cause unintended results [CVE-2015-7976].

A remote user can send a specially crafted ntpdc reslist command to trigger a null pointer dereference and cause the target service to crash [CVE-2015-7977].

A remote user can send a specially crafted reslist command to consume all available stack memory [CVE-2015-7978].

A remote user can send a specially crafted broadcast mode packet to cause the target broadcast client to tear down the association with the broadcast server [CVE-2015-7979].

A remote server can send a specially crafted packet with an origin timestamp of zero to bypass the timestamp validation check in certain cases [CVE-2015-8138].

A remote user can send specially crafted data to trigger an infinite loop in ntpq [CVE-2015-8158].

A remote user can trigger an origin leak in ntpq and ntpdc to obtain potentially sensitive information [CVE-2015-8139].

A remote user on the local network may be able to conduct replay attacks against ntpq [CVE-2015-8140].

Cisco ASIG reported these vulnerabilities.

Impact:   A remote user can cause denial of service conditions.

A remote user can obtain potentially sensitive information on the target system.

A remote authenticated user can impersonate an ntp peer.

Solution:   Palo Alto Networks has issued a fix for CVE-2015-7973, CVE-2015-7974, CVE-2015-7975, CVE-2015-7976, CVE-2015-7977, CVE-2015-7978, CVE-2015-7979, CVE-2015-8138, and CVE-2015-8158 for Palo Alto PAN-OS (6.1.13, 7.0.9, 7.1.4).

The Palo Alto Networks advisory is available at:

https://securityadvisories.paloaltonetworks.com/Home/Detail/52

Vendor URL:  securityadvisories.paloaltonetworks.com/Home/Detail/52 (Links to External Site)
Cause:   Access control error, Authentication error, Boundary error

Message History:   This archive entry is a follow-up to the message listed below.
Jan 22 2016 ntp Multiple Flaws Let Remote Users Spoof Messages, Obtain Potentially Sensitive Information, and Deny Service



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC