SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Embedded Server/Appliance)  >   Blue Coat Director Vendors:   Blue Coat Systems
(Blue Coat Systems Issues Advisory for Blue Coat Director) ntp Multiple Bugs Let Remote or Local Users Cause the Target Service to Crash
SecurityTracker Alert ID:  1038346
SecurityTracker URL:  http://securitytracker.com/id/1038346
CVE Reference:   CVE-2016-9042, CVE-2017-6451, CVE-2017-6452, CVE-2017-6455, CVE-2017-6458, CVE-2017-6460, CVE-2017-6462, CVE-2017-6463, CVE-2017-6464   (Links to External Site)
Date:  Apr 21 2017
Impact:   Denial of service via local system, Denial of service via network
Vendor Confirmed:  Yes  
Version(s): 6.1
Description:   Multiple vulnerabilities were reported in ntp. A remote or local user can cause the target service to crash. Blue Coat Director is affected.

A remote authenticated user can set a specially crafted configuration directive to cause the target ntpd service to crash [CVE-2017-6464].

A local user that can load a specially crafted '/dev/datum/' device can trigger a buffer overflow in datum_pts_receive() in the legacy Datum Programmable Time Server refclock driver and cause denial of service conditions [CVE-2017-6462].

A remote authenticated user can send a specially crafted ':config' directive to trigger a segmentation fault on the target NTP server [CVE-2017-6463].

A local user can cause DLLs to be executed with elevated privileges and cause denial of service conditions on Windows-based systems [CVE-2017-6455].

A local user can supply specially crafted command line parameters to trigger a stack overflow in addSourceToRegistry() on Windows-based systems [CVE-2017-6452].

A remote user can cause a data structure to be terminated incorrectly on Windows-based systems [CVE-2017-6459].

A remote user can send specially crafted data to trigger an overflow in the ctl_put() function and cause the target service to crash [CVE-2017-6458].

A remote user may be able to trigger an out-of-bounds memory write error in mx4200_send() on systems with the legacy MX4200 refclock enabled and cause the target service to crash [CVE-2017-6451].

A remote ntpd server can trigger a stack buffer overflow in ntpq when return a restriction list to cause the target ntpq service to crash [CVE-2017-6460].

A remote user that can spoof servers can exploit a timestamp origin check flaw and cause timestamp reset replies to be dropped [CVE-2016-9042].

Cure53 and Matthew Van Gundy of Cisco ASIG reported these vulnerabilities.

Impact:   A remote or local user can cause the target service to crash.
Solution:   Blue Coat Systems has issued an advisory for CVE-2016-9042, CVE-2017-6451, CVE-2017-6452, CVE-2017-6455, CVE-2017-6458, CVE-2017-6460, CVE-2017-6462, CVE-2017-6463, and CVE-2017-6464 for Blue Coat Director.

No solution was available at the time of this entry.

The Blue Coat Systems advisory is available at:

https://bto.bluecoat.com/security-advisory/sa147

Vendor URL:  bto.bluecoat.com/security-advisory/sa147 (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error, State error

Message History:   This archive entry is a follow-up to the message listed below.
Mar 24 2017 ntp Multiple Bugs Let Remote or Local Users Cause the Target Service to Crash



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC