SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   ntp Vendors:   ntp.org
(Oracle Issues Fix for Oracle Linux) ntp Multiple Flaws Let Remote Users Spoof Messages, Obtain Potentially Sensitive Information, and Deny Service
SecurityTracker Alert ID:  1039664
SecurityTracker URL:  http://securitytracker.com/id/1039664
CVE Reference:   CVE-2015-7979   (Links to External Site)
Date:  Oct 26 2017
Impact:   Denial of service via network, Disclosure of system information, Disclosure of user information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 4.2.8p6
Description:   Multiple vulnerabilities were reported in ntp. A remote user can cause denial of service conditions on the target system. A remote user can obtain potentially sensitive information on the target system. A remote user can impersonate ntp peers.

A remote user can conduct a replay attack against authenticated broadcast mode packets [CVE-2015-7973].

A remote authenticated user can exploit a key check flaw to impersonate a peer [CVE-2015-7974].

A remote user can send specially crafted data to trigger a buffer overflow in the nextvar() function in ntpq and cause the target service to crash [CVE-2015-7975].

A remote authenticated user can send an ntpq saveconfig command with specially crafted filename characters to cause unintended results [CVE-2015-7976].

A remote user can send a specially crafted ntpdc reslist command to trigger a null pointer dereference and cause the target service to crash [CVE-2015-7977].

A remote user can send a specially crafted reslist command to consume all available stack memory [CVE-2015-7978].

A remote user can send a specially crafted broadcast mode packet to cause the target broadcast client to tear down the association with the broadcast server [CVE-2015-7979].

A remote server can send a specially crafted packet with an origin timestamp of zero to bypass the timestamp validation check in certain cases [CVE-2015-8138].

A remote user can send specially crafted data to trigger an infinite loop in ntpq [CVE-2015-8158].

A remote user can trigger an origin leak in ntpq and ntpdc to obtain potentially sensitive information [CVE-2015-8139].

A remote user on the local network may be able to conduct replay attacks against ntpq [CVE-2015-8140].

Cisco ASIG reported these vulnerabilities.

Impact:   A remote user can cause denial of service conditions.

A remote user can obtain potentially sensitive information on the target system.

A remote authenticated user can impersonate an ntp peer.

Solution:   Oracle has issued a fix for CVE-2015-7979.

The Oracle Linux advisory is available at:

http://linux.oracle.com/errata/ELSA-2017-3071.html

Vendor URL:  linux.oracle.com/errata/ELSA-2017-3071.html (Links to External Site)
Cause:   Access control error, Authentication error, Boundary error
Underlying OS:  Linux (Oracle)
Underlying OS Comments:  6

Message History:   This archive entry is a follow-up to the message listed below.
Jan 22 2016 ntp Multiple Flaws Let Remote Users Spoof Messages, Obtain Potentially Sensitive Information, and Deny Service



 Source Message Contents

Subject:  [El-errata] ELSA-2017-3071 Moderate: Oracle Linux 6 ntp security update

Oracle Linux Security Advisory ELSA-2017-3071

http://linux.oracle.com/errata/ELSA-2017-3071.html

The following updated rpms for Oracle Linux 6 have been uploaded to the 
Unbreakable Linux Network:

i386:
ntp-4.2.6p5-12.0.1.el6_9.1.i686.rpm
ntp-doc-4.2.6p5-12.0.1.el6_9.1.noarch.rpm
ntp-perl-4.2.6p5-12.0.1.el6_9.1.i686.rpm
ntpdate-4.2.6p5-12.0.1.el6_9.1.i686.rpm

x86_64:
ntp-4.2.6p5-12.0.1.el6_9.1.x86_64.rpm
ntp-doc-4.2.6p5-12.0.1.el6_9.1.noarch.rpm
ntp-perl-4.2.6p5-12.0.1.el6_9.1.x86_64.rpm
ntpdate-4.2.6p5-12.0.1.el6_9.1.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/ntp-4.2.6p5-12.0.1.el6_9.1.src.rpm



Description of changes:

[4.2.6p5-12.0.1.el6_9.1]
- add disable monitor to default ntp.conf [CVE-2013-5211]

[4.2.6p5-12.el6_9.1]
- fix buffer overflow in datum refclock driver (CVE-2017-6462)
- fix crash with invalid unpeer command (CVE-2017-6463)
- fix potential crash with invalid server command (CVE-2017-6464)

[4.2.6p5-12]
- don't limit rate of packets from sources (CVE-2016-7426)
- don't change interface from received packets (CVE-2016-7429)
- fix calculation of root distance again (CVE-2016-7433)
- require authentication for trap commands (CVE-2016-9310)
- fix crash when reporting peer event to trappers (CVE-2016-9311)

[4.2.6p5-11]
- don't allow spoofed packets to demobilize associations (CVE-2015-7979,
   CVE-2016-1547)
- don't allow spoofed packet to enable symmetric interleaved mode
   (CVE-2016-1548)
- check mode of new source in config command (CVE-2016-2518)
- make MAC check resilient against timing attack (CVE-2016-1550)


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC