SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   IBM Security Access Manager Vendors:   IBM
(IBM Issues Fix for IBM Security Access Manager) ntp Multiple Flaws Let Remote Users Deny Service, View Files, and Bypass Authentication to Modify the Time
SecurityTracker Alert ID:  1036774
SecurityTracker URL:  http://securitytracker.com/id/1036774
CVE Reference:   CVE-2015-7691, CVE-2015-7692, CVE-2015-7701, CVE-2015-7702, CVE-2015-7703   (Links to External Site)
Date:  Sep 13 2016
Impact:   Denial of service via network, Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.0, 8.0, 8.0.0.2, 8.0.0.4, 8.0.0.5, 8.0.1, 8.0.1.2, 8.0.1.3, 8.0.1.4, 9.0, 9.0.0.1, 9.0.1
Description:   Multiple vulnerabilities were reported in ntp. A remote user can view files on the target system. A remote user can cause denial of service conditions on the target system. A remote user can bypass authentication. A remote user can modify the time on the target system. IBM Security Access Manager is affected.

A remote user can trigger a memory leak in CRYPTO_ASSOC [CVE-2015-7701].

A remote user can send AutoKey messages with a specially crafted AutoKey data packet length value to cause denial of service conditions [CVE-2015-7691, CVE-2015-7692, CVE-2015-7702].

A remote user can overwrite "pidfile" and "driftfile" configuration file directives [CVE-2015-7703].

A remote user can supply specially crafted data to cause denial of service conditions [CVE-2015-7704, CVE-2015-7705].

A remote user can trigger a mode 7 loop counter integer overflow in ntpd [CVE-2015-7848].

A remote user can trigger a use-after-free memory error in the processing of trusted keys [CVE-2015-7849].

A remote user can exploit a logfile-keyfile configuration flaw to cause denial of service conditions [CVE-2015-7850].

A remote user can exploit a directory traversal flaw in ntpd saveconfig [CVE-2015-7851].

A remote user can trigger a memory corruption error in the ntpq atoascii() function [CVE-2015-7852].

A remote user can supply specially crafted reference clock data to trigger a buffer overflow [CVE-2015-7853].

A remote user can supply a specially crafted password value to trigger a memory corruption error [CVE-2015-7854].

A remote user can send a specially crafted control packet message to exploit a flaw in decodenetnum() to cause denial of service conditions [CVE-2015-7855].

A remote user can exploit a flaw in the crypto-NAK() function to bypass symmetric association authentication [CVE-2015-7871].

Cisco ASIG, IDA, Cisco TALOS, Tenable, RedHat, OpenVMS, and Boston University reported these vulnerabilities.

Impact:   A remote user can modify time on the target system.

A remote user can view files on the target system.

A remote user can cause denial of service conditions.

A remote user can bypass authentication on the target system.

Solution:   IBM has issued a fix for CVE-2015-7691, CVE-2015-7692, CVE-2015-7701, CVE-2015-7702, and CVE-2015-7703 for IBM Security Access Manager (APARs IV87108, IV87124, IV87150, IV87153).

The IBM advisories are available at:

http://www-01.ibm.com/support/docview.wss?uid=swg21989542
http://www-01.ibm.com/support/docview.wss?uid=swg21989544

Vendor URL:  www-01.ibm.com/support/docview.wss?uid=swg21989542 (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error
Underlying OS:  Linux (Red Hat Enterprise), Linux (SuSE), UNIX (AIX), UNIX (Solaris - SunOS), Windows (Any)

Message History:   This archive entry is a follow-up to the message listed below.
Oct 23 2015 ntp Multiple Flaws Let Remote Users Deny Service, View Files, and Bypass Authentication to Modify the Time



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC