Vulnerabilities > CVE-2005-2496 - Unspecified vulnerability in Dave Mills Ntpd

047910
CVSS 4.6 - MEDIUM
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
local
low complexity
dave-mills
nessus

Summary

The xntpd ntp (ntpd) daemon before 4.2.0b, when run with the -u option and using a string to specify the group, uses the group ID of the user instead of the group, which causes xntpd to run with different privileges than intended.

Vulnerable Configurations

Part Description Count
Application
Dave_Mills
1

Nessus

  • NASL familyMisc.
    NASL idNTP_INCORRECT_GROUP_PRIVS.NASL
    descriptionAccording to its version number, the NTP (Network Time Protocol) server running on the remote host is affected by a flaw that causes it to run with the permissions of a privileged user if a group name rather than a group ID is specified on the command line. A local attacker, who has managed to compromise the application through some other means, can exploit this issue to gain elevated privileges.
    last seen2020-06-01
    modified2020-06-02
    plugin id19517
    published2005-08-29
    reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19517
    titleNetwork Time Protocol Daemon (ntpd) < 4.2.1 -u Group Permission Weakness Privilege Escalation
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2005-812.NASL
    descriptionWhen starting xntpd with the -u option and specifying the group by using a string not a numeric gid the daemon uses the gid of the user not the group. This problem is now fixed by this update. The Common Vulnerabilities and Exposures project assigned the name CVE-2005-2496 to this issue. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id19720
    published2005-09-17
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19720
    titleFedora Core 3 : ntp-4.2.0.a.20040617-5.FC3 (2005-812)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-175-1.NASL
    descriptionThomas Biege discovered a flaw in the privilege dropping of the NTP server. When ntpd was configured to drop root privileges, and the group to run under was specified as a name (as opposed to a numeric group ID), ntpd changed to the wrong group. Depending on the actual group it changed to, this could either cause non-minimal privileges, or a malfunctioning ntp server if the group does not have the privileges that ntpd actually needs. On Ubuntu 4.10, ntpd does not use privilege dropping by default, so you are only affected if you manually activated it. In Ubuntu 5.04, privilege dropping is used by default, but this bug is already fixed. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id20585
    published2006-01-15
    reporterUbuntu Security Notice (C) 2005-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20585
    titleUbuntu 4.10 : ntp vulnerability (USN-175-1)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2006-0393.NASL
    descriptionUpdated ntp packages that fix several bugs are now available. This update has been rated as having low security impact by the Red Hat Security Response Team. The Network Time Protocol (NTP) is used to synchronize a computer
    last seen2020-06-01
    modified2020-06-02
    plugin id22220
    published2006-08-14
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/22220
    titleRHEL 4 : ntp (RHSA-2006:0393)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2005-156.NASL
    descriptionWhen starting xntpd with the -u option and specifying the group by using a string not a numeric gid the daemon uses the gid of the user not the group. The updated packages have been patched to correct this problem.
    last seen2017-10-29
    modified2012-09-07
    plugin id20424
    published2006-01-15
    reporterTenable
    sourcehttps://www.tenable.com/plugins/index.php?view=single&id=20424
    titleMDKSA-2005:156 : ntp
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2006-0393.NASL
    descriptionUpdated ntp packages that fix several bugs are now available. This update has been rated as having low security impact by the Red Hat Security Response Team. The Network Time Protocol (NTP) is used to synchronize a computer
    last seen2020-06-01
    modified2020-06-02
    plugin id22275
    published2006-08-30
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/22275
    titleCentOS 4 : ntp (CESA-2006:0393)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-801.NASL
    descriptionSuSE developers discovered that ntp confuses the given group id with the group id of the given user when called with a group id on the commandline that is specified as a string and not as a numeric gid, which causes ntpd to run with different privileges than intended.
    last seen2020-06-01
    modified2020-06-02
    plugin id19571
    published2005-09-06
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19571
    titleDebian DSA-801-1 : ntp - programming error

Oval

accepted2013-04-29T04:21:13.175-04:00
classvulnerability
contributors
  • nameAharon Chernin
    organizationSCAP.com, LLC
  • nameDragos Prisaca
    organizationG2, Inc.
definition_extensions
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 4
    ovaloval:org.mitre.oval:def:11831
  • commentCentOS Linux 4.x
    ovaloval:org.mitre.oval:def:16636
  • commentOracle Linux 4.x
    ovaloval:org.mitre.oval:def:15990
descriptionThe xntpd ntp (ntpd) daemon before 4.2.0b, when run with the -u option and using a string to specify the group, uses the group ID of the user instead of the group, which causes xntpd to run with different privileges than intended.
familyunix
idoval:org.mitre.oval:def:9669
statusaccepted
submitted2010-07-09T03:56:16-04:00
titleThe xntpd ntp (ntpd) daemon before 4.2.0b, when run with the -u option and using a string to specify the group, uses the group ID of the user instead of the group, which causes xntpd to run with different privileges than intended.
version26

Redhat

advisories
bugzilla
id187003
titlentpdate not invoked when supplying the -x option
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 4 is installed
      ovaloval:com.redhat.rhba:tst:20070304025
    • commentntp is earlier than 0:4.2.0.a.20040617-4.EL4.1
      ovaloval:com.redhat.rhsa:tst:20060393001
    • commentntp is signed with Red Hat master key
      ovaloval:com.redhat.rhsa:tst:20060393002
rhsa
idRHSA-2006:0393
released2006-08-10
severityLow
titleRHSA-2006:0393: ntp security update (Low)
rpms
  • ntp-0:4.2.0.a.20040617-4.EL4.1
  • ntp-debuginfo-0:4.2.0.a.20040617-4.EL4.1