SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   ntp Vendors:   ntp.org
(CentOS Issues Fix) ntp Multiple Bugs Let Remote or Local Users Cause the Target Service to Crash
SecurityTracker Alert ID:  1039681
SecurityTracker URL:  http://securitytracker.com/id/1039681
CVE Reference:   CVE-2017-6462, CVE-2017-6463, CVE-2017-6464   (Links to External Site)
Date:  Oct 27 2017
Impact:   Denial of service via local system, Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 4.2.8p9 and prior
Description:   Multiple vulnerabilities were reported in ntp. A remote or local user can cause the target service to crash.

A remote authenticated user can set a specially crafted configuration directive to cause the target ntpd service to crash [CVE-2017-6464].

A local user that can load a specially crafted '/dev/datum/' device can trigger a buffer overflow in datum_pts_receive() in the legacy Datum Programmable Time Server refclock driver and cause denial of service conditions [CVE-2017-6462].

A remote authenticated user can send a specially crafted ':config' directive to trigger a segmentation fault on the target NTP server [CVE-2017-6463].

A local user can cause DLLs to be executed with elevated privileges and cause denial of service conditions on Windows-based systems [CVE-2017-6455].

A local user can supply specially crafted command line parameters to trigger a stack overflow in addSourceToRegistry() on Windows-based systems [CVE-2017-6452].

A remote user can cause a data structure to be terminated incorrectly on Windows-based systems [CVE-2017-6459].

A remote user can send specially crafted data to trigger an overflow in the ctl_put() function and cause the target service to crash [CVE-2017-6458].

A remote user may be able to trigger an out-of-bounds memory write error in mx4200_send() on systems with the legacy MX4200 refclock enabled and cause the target service to crash [CVE-2017-6451].

A remote ntpd server can trigger a stack buffer overflow in ntpq when return a restriction list to cause the target ntpq service to crash [CVE-2017-6460].

A remote user that can spoof servers can exploit a timestamp origin check flaw and cause timestamp reset replies to be dropped [CVE-2016-9042].

Cure53 and Matthew Van Gundy of Cisco ASIG reported these vulnerabilities.

Impact:   A remote or local user can cause the target service to crash.
Solution:   CentOS has issued a fix for CVE-2017-6462, CVE-2017-6463, and CVE-2017-6464.

i386:
e2dc7d323fdff02674abf27c51cba5cd3bf2b9c9185851bc003ca2cb61234d0a ntp-4.2.6p5-12.el6.centos.1.i686.rpm
158ab373f5d0392f4e3168fc548d889218036ca71e3612c22fd655343a834dac ntpdate-4.2.6p5-12.el6.centos.1.i686.rpm
98157086964064a8175b71c4b70121a4109802cf5678b17b70c10e650d0b043d ntp-doc-4.2.6p5-12.el6.centos.1.noarch.rpm
bb7742afa687e7d0d0d2031d8dbfc938e1a239a65cc1d51da35d5321113688dc ntp-perl-4.2.6p5-12.el6.centos.1.i686.rpm

x86_64:
b90705825a7665764895b2b0f5f0fa253f3cd8053f7ba4e4bf22ea0eb60ad119 ntp-4.2.6p5-12.el6.centos.1.x86_64.rpm
5383d9b247aa508f0d02fa89e11e2e8a3760537f680d0323abd9af544d16d3e5 ntpdate-4.2.6p5-12.el6.centos.1.x86_64.rpm
98157086964064a8175b71c4b70121a4109802cf5678b17b70c10e650d0b043d ntp-doc-4.2.6p5-12.el6.centos.1.noarch.rpm
43f5fbf0dc6b734fca4848fc47bae07ff975b24929c8ad160383ed68dedcadce ntp-perl-4.2.6p5-12.el6.centos.1.x86_64.rpm

Source:
ad6efac5d8fa6c0476a3c2e19ef9e4660ba834bf7a411b668f05346167a5f483 ntp-4.2.6p5-12.el6.centos.1.src.rpm

Cause:   Access control error, Boundary error, Input validation error, State error
Underlying OS:  Linux (CentOS)
Underlying OS Comments:  6

Message History:   This archive entry is a follow-up to the message listed below.
Mar 24 2017 ntp Multiple Bugs Let Remote or Local Users Cause the Target Service to Crash



 Source Message Contents

Subject:  [CentOS-announce] CESA-2017:3071 Moderate CentOS 6 ntp Security Update


CentOS Errata and Security Advisory 2017:3071 Moderate

Upstream details at : https://access.redhat.com/errata/RHSA-2017:3071

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
e2dc7d323fdff02674abf27c51cba5cd3bf2b9c9185851bc003ca2cb61234d0a  ntp-4.2.6p5-12.el6.centos.1.i686.rpm
158ab373f5d0392f4e3168fc548d889218036ca71e3612c22fd655343a834dac  ntpdate-4.2.6p5-12.el6.centos.1.i686.rpm
98157086964064a8175b71c4b70121a4109802cf5678b17b70c10e650d0b043d  ntp-doc-4.2.6p5-12.el6.centos.1.noarch.rpm
bb7742afa687e7d0d0d2031d8dbfc938e1a239a65cc1d51da35d5321113688dc  ntp-perl-4.2.6p5-12.el6.centos.1.i686.rpm

x86_64:
b90705825a7665764895b2b0f5f0fa253f3cd8053f7ba4e4bf22ea0eb60ad119  ntp-4.2.6p5-12.el6.centos.1.x86_64.rpm
5383d9b247aa508f0d02fa89e11e2e8a3760537f680d0323abd9af544d16d3e5  ntpdate-4.2.6p5-12.el6.centos.1.x86_64.rpm
98157086964064a8175b71c4b70121a4109802cf5678b17b70c10e650d0b043d  ntp-doc-4.2.6p5-12.el6.centos.1.noarch.rpm
43f5fbf0dc6b734fca4848fc47bae07ff975b24929c8ad160383ed68dedcadce  ntp-perl-4.2.6p5-12.el6.centos.1.x86_64.rpm

Source:
ad6efac5d8fa6c0476a3c2e19ef9e4660ba834bf7a411b668f05346167a5f483  ntp-4.2.6p5-12.el6.centos.1.src.rpm



-- 
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC