SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   ntp Vendors:   ntp.org
(IBM Issues Fix for IBM AIX) ntp Multiple Bugs Let Remote or Local Users Cause the Target Service to Crash
SecurityTracker Alert ID:  1038843
SecurityTracker URL:  http://securitytracker.com/id/1038843
CVE Reference:   CVE-2017-6451, CVE-2017-6458, CVE-2017-6462, CVE-2017-6464   (Links to External Site)
Date:  Jul 11 2017
Impact:   Denial of service via local system, Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 4.2.8p9 and prior
Description:   Multiple vulnerabilities were reported in ntp. A remote or local user can cause the target service to crash.

A remote authenticated user can set a specially crafted configuration directive to cause the target ntpd service to crash [CVE-2017-6464].

A local user that can load a specially crafted '/dev/datum/' device can trigger a buffer overflow in datum_pts_receive() in the legacy Datum Programmable Time Server refclock driver and cause denial of service conditions [CVE-2017-6462].

A remote authenticated user can send a specially crafted ':config' directive to trigger a segmentation fault on the target NTP server [CVE-2017-6463].

A local user can cause DLLs to be executed with elevated privileges and cause denial of service conditions on Windows-based systems [CVE-2017-6455].

A local user can supply specially crafted command line parameters to trigger a stack overflow in addSourceToRegistry() on Windows-based systems [CVE-2017-6452].

A remote user can cause a data structure to be terminated incorrectly on Windows-based systems [CVE-2017-6459].

A remote user can send specially crafted data to trigger an overflow in the ctl_put() function and cause the target service to crash [CVE-2017-6458].

A remote user may be able to trigger an out-of-bounds memory write error in mx4200_send() on systems with the legacy MX4200 refclock enabled and cause the target service to crash [CVE-2017-6451].

A remote ntpd server can trigger a stack buffer overflow in ntpq when return a restriction list to cause the target ntpq service to crash [CVE-2017-6460].

A remote user that can spoof servers can exploit a timestamp origin check flaw and cause timestamp reset replies to be dropped [CVE-2016-9042].

Cure53 and Matthew Van Gundy of Cisco ASIG reported these vulnerabilities.

Impact:   A remote or local user can cause the target service to crash.
Solution:   IBM has issued a fix for CVE-2017-6451, CVE-2017-6458, CVE-2017-6462, and CVE-2017-6464 for IBM AIX.

The IBM advisory is available at:

https://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc

Vendor URL:  aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error, State error
Underlying OS:  UNIX (AIX)
Underlying OS Comments:  5.3, 6.1, 7.1, 7.2

Message History:   This archive entry is a follow-up to the message listed below.
Mar 24 2017 ntp Multiple Bugs Let Remote or Local Users Cause the Target Service to Crash



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC