Vulnerabilities > CVE-2014-9295 - Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in NTP

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
ntp
CWE-119
nessus

Summary

Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata function, and (3) the configure function.

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Buffer Overflow via Environment Variables
    This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
  • Overflow Buffers
    Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
  • Client-side Injection-induced Buffer Overflow
    This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service.
  • Filter Failure through Buffer Overflow
    In this attack, the idea is to cause an active filter to fail by causing an oversized transaction. An attacker may try to feed overly long input strings to the program in an attempt to overwhelm the filter (by causing a buffer overflow) and hoping that the filter does not fail securely (i.e. the user input is let into the system unfiltered).
  • MIME Conversion
    An attacker exploits a weakness in the MIME conversion routine to cause a buffer overflow and gain control over the mail server machine. The MIME system is designed to allow various different information formats to be interpreted and sent via e-mail. Attack points exist when data are converted to MIME compatible format and back.

Nessus

  • NASL familyOracleVM Local Security Checks
    NASL idORACLEVM_OVMSA-2015-0002.NASL
    descriptionThe remote OracleVM system is missing necessary patches to address critical security updates : - don
    last seen2020-06-01
    modified2020-06-02
    plugin id80395
    published2015-01-07
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/80395
    titleOracleVM 2.2 : ntp (OVMSA-2015-0002)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The package checks in this plugin were extracted from OracleVM
    # Security Advisory OVMSA-2015-0002.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(80395);
      script_version("1.19");
      script_cvs_date("Date: 2019/09/27 13:00:34");
    
      script_cve_id("CVE-2009-0021", "CVE-2009-0159", "CVE-2009-1252", "CVE-2009-3563", "CVE-2014-9293", "CVE-2014-9294", "CVE-2014-9295");
      script_bugtraq_id(33150, 34481, 35017, 37255, 71757, 71761, 71762);
    
      script_name(english:"OracleVM 2.2 : ntp (OVMSA-2015-0002)");
      script_summary(english:"Checks the RPM output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote OracleVM host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The remote OracleVM system is missing necessary patches to address
    critical security updates :
    
      - don't generate weak control key for resolver
        (CVE-2014-9293)
    
      - don't generate weak MD5 keys in ntp-keygen
        (CVE-2014-9294)
    
      - fix buffer overflows via specially-crafted packets
        (CVE-2014-9295)
    
      - increase memlock limit again (#1035198)
    
      - allow selection of cipher for private key files
        (#741573)
    
      - revert init script priority (#470945, #689636)
    
      - drop tentative patch (#489835)
    
      - move restorecon call to %posttrans
    
      - call restorecon on ntpd and ntpdate on start (#470945)
    
      - don't crash with more than 512 local addresses (#661934)
    
      - add -I option (#528799)
    
      - fix -L option to not require argument (#460434)
    
      - move ntpd and ntpdate to /sbin and start earlier on boot
        (#470945, #689636)
    
      - increase memlock limit (#575874)
    
      - ignore tentative addresses (#489835)
    
      - print synchronization distance instead of dispersion in
        ntpstat (#679034)
    
      - fix typos in ntpq and ntp-keygen man pages (#664524,
        #664525)
    
      - clarify ntpd -q description (#591838)
    
      - don't verify ntp.conf (#481151)
    
      - replace Prereq tag
    
      - fix DoS with mode 7 packets (#532640, CVE-2009-3563)
    
      - compile with -fno-strict-aliasing
    
      - fix buffer overflow when parsing Autokey association
        message (#500784, CVE-2009-1252)
    
      - fix buffer overflow in ntpq (#500784, CVE-2009-0159)
    
      - fix check for malformed signatures (#479699,
        CVE-2009-0021)"
      );
      # https://oss.oracle.com/pipermail/oraclevm-errata/2015-January/000253.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?cb11e689"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected ntp package.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(119, 287);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:vm:ntp");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:vm_server:2.2");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2009/01/07");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/01/06");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/01/07");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"OracleVM Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/OracleVM/release", "Host/OracleVM/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/OracleVM/release");
    if (isnull(release) || "OVS" >!< release) audit(AUDIT_OS_NOT, "OracleVM");
    if (! preg(pattern:"^OVS" + "2\.2" + "(\.[0-9]|$)", string:release)) audit(AUDIT_OS_NOT, "OracleVM 2.2", "OracleVM " + release);
    if (!get_kb_item("Host/OracleVM/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "OracleVM", cpu);
    
    flag = 0;
    if (rpm_check(release:"OVS2.2", reference:"ntp-4.2.2p1-18.el5_11")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ntp");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_NTP-141219.NASL
    descriptionThis ntp update fixes the following critical security issue : - A potential remote code execution problem was found inside ntpd. The functions crypto_recv() (when using autokey authentication) and ctl_putdata() where updated to avoid buffer overflows that could have been exploited. (CVE-2014-9295 / VU#852879)
    last seen2020-06-05
    modified2014-12-23
    plugin id80217
    published2014-12-23
    reporterThis script is Copyright (C) 2014-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/80217
    titleSuSE 11.3 Security Update : ntp (SAT Patch Number 10117)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from SuSE 11 update information. The text itself is
    # copyright (C) Novell, Inc.
    #
    
    if (NASL_LEVEL < 3000) exit(0);
    
    include("compat.inc");
    
    if (description)
    {
      script_id(80217);
      script_version("1.9");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2014-9295");
      script_xref(name:"CERT", value:"852879");
    
      script_name(english:"SuSE 11.3 Security Update : ntp (SAT Patch Number 10117)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote SuSE 11 host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This ntp update fixes the following critical security issue :
    
      - A potential remote code execution problem was found
        inside ntpd. The functions crypto_recv() (when using
        autokey authentication) and ctl_putdata() where updated
        to avoid buffer overflows that could have been
        exploited. (CVE-2014-9295 / VU#852879)"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=910764"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2014-9295.html"
      );
      script_set_attribute(attribute:"solution", value:"Apply SAT patch number 10117.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:ntp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:ntp-doc");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:11");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2014/12/19");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/12/23");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2020 Tenable Network Security, Inc.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release !~ "^(SLED|SLES)11") audit(AUDIT_OS_NOT, "SuSE 11");
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SuSE 11", cpu);
    
    pl = get_kb_item("Host/SuSE/patchlevel");
    if (isnull(pl) || int(pl) != 3) audit(AUDIT_OS_NOT, "SuSE 11.3");
    
    
    flag = 0;
    if (rpm_check(release:"SLED11", sp:3, cpu:"i586", reference:"ntp-4.2.4p8-1.28.1")) flag++;
    if (rpm_check(release:"SLED11", sp:3, cpu:"i586", reference:"ntp-doc-4.2.4p8-1.28.1")) flag++;
    if (rpm_check(release:"SLED11", sp:3, cpu:"x86_64", reference:"ntp-4.2.4p8-1.28.1")) flag++;
    if (rpm_check(release:"SLED11", sp:3, cpu:"x86_64", reference:"ntp-doc-4.2.4p8-1.28.1")) flag++;
    if (rpm_check(release:"SLES11", sp:3, reference:"ntp-4.2.4p8-1.28.1")) flag++;
    if (rpm_check(release:"SLES11", sp:3, reference:"ntp-doc-4.2.4p8-1.28.1")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyAmazon Linux Local Security Checks
    NASL idALA_ALAS-2014-462.NASL
    descriptionIt was found that ntpd automatically generated weak keys for its internal use if no ntpdc request authentication key was specified in the ntp.conf configuration file. A remote attacker able to match the configured IP restrictions could guess the generated key, and possibly use it to send ntpdc query or configuration requests. (CVE-2014-9293) It was found that ntp-keygen used a weak method for generating MD5 keys. This could possibly allow an attacker to guess generated MD5 keys that could then be used to spoof an NTP client or server. Note: it is recommended to regenerate any MD5 keys that had explicitly been generated with ntp-keygen; the default installation does not contain such keys). (CVE-2014-9294) Multiple buffer overflow flaws were discovered in ntpd
    last seen2020-06-01
    modified2020-06-02
    plugin id80122
    published2014-12-22
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/80122
    titleAmazon Linux AMI : ntp (ALAS-2014-462)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Amazon Linux AMI Security Advisory ALAS-2014-462.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(80122);
      script_version("1.12");
      script_cvs_date("Date: 2018/04/18 15:09:35");
    
      script_cve_id("CVE-2014-9293", "CVE-2014-9294", "CVE-2014-9295", "CVE-2014-9296");
      script_xref(name:"ALAS", value:"2014-462");
    
      script_name(english:"Amazon Linux AMI : ntp (ALAS-2014-462)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Amazon Linux AMI host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "It was found that ntpd automatically generated weak keys for its
    internal use if no ntpdc request authentication key was specified in
    the ntp.conf configuration file. A remote attacker able to match the
    configured IP restrictions could guess the generated key, and possibly
    use it to send ntpdc query or configuration requests. (CVE-2014-9293)
    
    It was found that ntp-keygen used a weak method for generating MD5
    keys. This could possibly allow an attacker to guess generated MD5
    keys that could then be used to spoof an NTP client or server. Note:
    it is recommended to regenerate any MD5 keys that had explicitly been
    generated with ntp-keygen; the default installation does not contain
    such keys). (CVE-2014-9294)
    
    Multiple buffer overflow flaws were discovered in ntpd's
    crypto_recv(), ctl_putdata(), and configure() functions. A remote
    attacker could use either of these flaws to send a specially crafted
    request packet that could crash ntpd or, potentially, execute
    arbitrary code with the privileges of the ntp user. Note: the
    crypto_recv() flaw requires non default configurations to be active,
    while the ctl_putdata() flaw, by default, can only be exploited via
    local attackers, and the configure() flaw requires additional
    authentication to exploit. (CVE-2014-9295)
    
    A missing return statement in the receive() function could potentially
    allow a remote attacker to bypass NTP's authentication mechanism.
    (CVE-2014-9296)"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://alas.aws.amazon.com/ALAS-2014-462.html"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Run 'yum update ntp' to update your system."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:ntp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:ntp-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:ntp-doc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:ntp-perl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:ntpdate");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:amazon:linux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2014/12/19");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/12/22");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");
      script_family(english:"Amazon Linux Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/AmazonLinux/release", "Host/AmazonLinux/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    release = get_kb_item("Host/AmazonLinux/release");
    if (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, "Amazon Linux");
    os_ver = pregmatch(pattern: "^AL(A|\d)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Amazon Linux");
    os_ver = os_ver[1];
    if (os_ver != "A")
    {
      if (os_ver == 'A') os_ver = 'AMI';
      audit(AUDIT_OS_NOT, "Amazon Linux AMI", "Amazon Linux " + os_ver);
    }
    
    if (!get_kb_item("Host/AmazonLinux/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (rpm_check(release:"ALA", reference:"ntp-4.2.6p5-2.22.amzn1")) flag++;
    if (rpm_check(release:"ALA", reference:"ntp-debuginfo-4.2.6p5-2.22.amzn1")) flag++;
    if (rpm_check(release:"ALA", reference:"ntp-doc-4.2.6p5-2.22.amzn1")) flag++;
    if (rpm_check(release:"ALA", reference:"ntp-perl-4.2.6p5-2.22.amzn1")) flag++;
    if (rpm_check(release:"ALA", reference:"ntpdate-4.2.6p5-2.22.amzn1")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ntp / ntp-debuginfo / ntp-doc / ntp-perl / ntpdate");
    }
    
  • NASL familyHP-UX Local Security Checks
    NASL idHPUX_PHNE_44235.NASL
    descriptions700_800 11.11 NTP timeservices upgrade plus utilities : Potential security vulnerabilities have been identified with HP-UX running NTP. These could be exploited remotely to execute code, create a Denial of Service (DoS), or other vulnerabilities. References: CVE-2014-9293 - Insufficient Entropy in Pseudo-Random Number Generator (PRNG) (CWE-332) CVE-2014-9294 - Use of Cryptographically Weak PRNG (CWE-338) CVE-2014-9295 - Stack Buffer Overflow (CWE-121) CVE-2014-9296 - Error Conditions, Return Values, Status Codes (CWE-389) CVE-2014-9297 - Improper Check for Unusual or Exceptional Conditions (CWE-754) SSRT101872 VU#852879.
    last seen2020-06-01
    modified2020-06-02
    plugin id82682
    published2015-04-10
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/82682
    titleHP-UX PHNE_44235 : s700_800 11.11 NTP timeservices upgrade plus utilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and patch checks in this plugin were 
    # extracted from HP patch PHNE_44235. The text itself is
    # copyright (C) Hewlett-Packard Development Company, L.P.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(82682);
      script_version("1.9");
      script_cvs_date("Date: 2018/07/12 19:01:15");
    
      script_cve_id("CVE-2014-9293", "CVE-2014-9294", "CVE-2014-9295", "CVE-2014-9296", "CVE-2014-9297");
      script_bugtraq_id(71757, 71758, 71761, 71762, 72583);
      script_xref(name:"CERT", value:"852879");
      script_xref(name:"HP", value:"emr_na-c04554677");
      script_xref(name:"TRA", value:"TRA-2015-04");
    
      script_name(english:"HP-UX PHNE_44235 : s700_800 11.11 NTP timeservices upgrade plus utilities");
      script_summary(english:"Checks for the patch in the swlist output");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote HP-UX host is missing a security-related patch."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "s700_800 11.11 NTP timeservices upgrade plus utilities : 
    
    Potential security vulnerabilities have been identified with HP-UX
    running NTP. These could be exploited remotely to execute code, create
    a Denial of Service (DoS), or other vulnerabilities. References:
    CVE-2014-9293 - Insufficient Entropy in Pseudo-Random Number Generator
    (PRNG) (CWE-332) CVE-2014-9294 - Use of Cryptographically Weak PRNG
    (CWE-338) CVE-2014-9295 - Stack Buffer Overflow (CWE-121)
    CVE-2014-9296 - Error Conditions, Return Values, Status Codes
    (CWE-389) CVE-2014-9297 - Improper Check for Unusual or Exceptional
    Conditions (CWE-754) SSRT101872 VU#852879."
      );
      # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c04554677
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?1d544704"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.tenable.com/security/research/tra-2015-04"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Install patch PHNE_44235 or subsequent."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2015/04/01");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/04/10");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2018 Tenable Network Security, Inc.");
      script_family(english:"HP-UX Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("hpux.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX");
    if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    if (!hpux_check_ctx(ctx:"11.11"))
    {
      exit(0, "The host is not affected since PHNE_44235 applies to a different OS release.");
    }
    
    patches = make_list("PHNE_44235");
    foreach patch (patches)
    {
      if (hpux_installed(app:patch))
      {
        exit(0, "The host is not affected because patch "+patch+" is installed.");
      }
    }
    
    
    flag = 0;
    if (hpux_check_patch(app:"InternetSrvcs.INET-ENG-A-MAN", version:"B.11.11")) flag++;
    if (hpux_check_patch(app:"InternetSrvcs.INETSVCS-BOOT", version:"B.11.11")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyMisc.
    NASL idNTP_4_2_8.NASL
    descriptionThe version of the remote NTP server is 4.x prior to 4.2.8p1. It is, therefore, affected by the following vulnerabilities : - A security weakness exists due to the config_auth() function improperly generating default keys when no authentication key is defined in the ntp.conf file. Key size is limited to 31 bits and the insecure ntp_random() function is used, resulting in cryptographically-weak keys with insufficient entropy. A remote attacker can exploit this to defeat cryptographic protection mechanisms via a brute-force attack. (CVE-2014-9293) - A security weakness exists due the use of a weak seed to prepare a random number generator used to generate symmetric keys. This allows a remote attacker to defeat cryptographic protection mechanisms via a brute-force attack. (CVE-2014-9294) - Multiple stack-based buffer overflow conditions exist due to improper validation of user-supplied input when handling packets in the crypto_recv(), ctl_putdata(), and configure() functions when using autokey authentication. A remote attacker can exploit this, via a specially crafted packet, to cause a denial of service condition or the execution of arbitrary code. (CVE-2014-9295) - A unspecified vulnerability exists due to missing return statements in the receive() function, resulting in continued processing even when an authentication error is encountered. This allows a remote attacker, via specially crafted packets, to trigger unintended association changes. (CVE-2014-9296) - An information disclosure vulnerability exists due to improper validation of the
    last seen2020-06-01
    modified2020-06-02
    plugin id81981
    published2015-03-20
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/81981
    titleNetwork Time Protocol Daemon (ntpd) 4.x < 4.2.8p1 Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(81981);
      script_version("1.10");
      script_cvs_date("Date: 2018/07/16 14:09:13");
    
      script_cve_id(
        "CVE-2014-9293",
        "CVE-2014-9294",
        "CVE-2014-9295",
        "CVE-2014-9296",
        "CVE-2014-9750",
        "CVE-2014-9751"
      );
      script_bugtraq_id(
        71757,
        71758,
        71761,
        71762,
        72583,
        72584
      );
      script_xref(name:"CERT", value:"852879");
    
      script_name(english:"Network Time Protocol Daemon (ntpd) 4.x < 4.2.8p1 Multiple Vulnerabilities");
      script_summary(english:"Checks for a vulnerable NTP server.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote NTP server is affected by multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The version of the remote NTP server is 4.x prior to 4.2.8p1. It is,
    therefore, affected by the following vulnerabilities :
    
      - A security weakness exists due to the config_auth()
        function improperly generating default keys when no
        authentication key is defined in the ntp.conf file.
        Key size is limited to 31 bits and the insecure
        ntp_random() function is used, resulting in
        cryptographically-weak keys with insufficient entropy. A
        remote attacker can exploit this to defeat cryptographic
        protection mechanisms via a brute-force attack.
        (CVE-2014-9293)
    
      - A security weakness exists due the use of a weak seed to
        prepare a random number generator used to generate
        symmetric keys. This allows a remote attacker to defeat
        cryptographic protection mechanisms via a brute-force
        attack. (CVE-2014-9294)
    
      - Multiple stack-based buffer overflow conditions exist
        due to improper validation of user-supplied input when
        handling packets in the crypto_recv(), ctl_putdata(),
        and configure() functions when using autokey
        authentication. A remote attacker can exploit this, via
        a specially crafted packet, to cause a denial of service
        condition or the execution of arbitrary code.
        (CVE-2014-9295)
    
      - A unspecified vulnerability exists due to missing return
        statements in the receive() function, resulting in 
        continued processing even when an authentication error
        is encountered. This allows a remote attacker, via
        specially crafted packets, to trigger unintended
        association changes. (CVE-2014-9296)
    
      - An information disclosure vulnerability exists due to
        improper validation of the 'vallen' value in extension
        fields in ntp_crypto.c. A remote attacker can exploit
        this to disclose sensitive information. (CVE-2014-9750)
    
      - A security bypass vulnerability exists due to a failure
        to restrict ::1 source addresses on IPv6 interfaces. A
        remote attacker can exploit this to bypass configured
        ACLs based on ::1. (CVE-2014-9751)
    
    Note that CVE-2014-9750 and CVE-2014-9751 supersede the discontinued
    identifiers CVE-2014-9297 and CVE-2014-9298, which were originally
    cited in the vendor advisory.");
      script_set_attribute(attribute:"see_also", value:"http://support.ntp.org/bin/view/Main/SecurityNotice");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to NTP version 4.2.8p1 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/12/19");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/12/19");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/03/20");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:ntp:ntp");
      script_set_attribute(attribute:"potential_vulnerability", value:"true");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Misc.");
    
      script_copyright(english:"This script is Copyright (C) 2015-2018 Tenable Network Security, Inc.");
    
      script_dependencies("ntp_open.nasl");
      script_require_keys("NTP/Running", "Settings/ParanoidReport");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    
    # Make sure NTP server is running
    get_kb_item_or_exit('NTP/Running');
    
    app_name = "NTP Server";
    
    port = get_kb_item("Services/udp/ntp");
    if (!port) port = 123;
    
    version = get_kb_item_or_exit("Services/ntp/version");
    if (version == 'unknown') audit(AUDIT_UNKNOWN_APP_VER, app_name);
    
    match = eregmatch(string:version, pattern:"([0-9a-z.]*)");
    if (isnull(match) || empty_or_null(match[1])) audit(AUDIT_UNKNOWN_APP_VER, app_name);
    
    # Paranoia check
    if (report_paranoia < 2) audit(AUDIT_PARANOID);
    
    ver = match[1];
    verfields = split(ver, sep:".", keep:FALSE);
    major = int(verfields[0]);
    minor = int(verfields[1]);
    if ('p' >< verfields[2])
    {
      revpatch = split(verfields[2], sep:"p", keep:FALSE);
      rev = int(revpatch[0]);
      patch = int(revpatch[1]);
    }
    else
    {
      rev = verfields[2];
      patch = 0;
    }
    
    # This vulnerability affects NTP 4.x < 4.2.8p1
    if (
      (major == 4 && minor < 2) ||
      (major == 4 && minor == 2 && rev < 8) ||
      (major == 4 && minor == 2 && rev == 8 && patch < 1)
    )
    {
      fix = "4.2.8p1";
    }
    else audit(AUDIT_INST_VER_NOT_VULN, app_name, version);
    
    report =
      '\n  Installed version : ' + version +
      '\n  Fixed version     : ' + fix +
      '\n';
    
    security_report_v4(
      port  : port,
      proto : "udp",
      extra : report,
      severity : SECURITY_HOLE
    );
    exit(0);
    
  • NASL familyOracleVM Local Security Checks
    NASL idORACLEVM_OVMSA-2014-0085.NASL
    descriptionThe remote OracleVM system is missing necessary patches to address critical security updates : - don
    last seen2020-06-01
    modified2020-06-02
    plugin id80248
    published2014-12-26
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/80248
    titleOracleVM 3.3 : ntp (OVMSA-2014-0085)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The package checks in this plugin were extracted from OracleVM
    # Security Advisory OVMSA-2014-0085.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(80248);
      script_version("1.13");
      script_cvs_date("Date: 2019/09/27 13:00:34");
    
      script_cve_id("CVE-2014-9293", "CVE-2014-9294", "CVE-2014-9295", "CVE-2014-9296");
      script_bugtraq_id(71757, 71758, 71761, 71762);
    
      script_name(english:"OracleVM 3.3 : ntp (OVMSA-2014-0085)");
      script_summary(english:"Checks the RPM output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote OracleVM host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The remote OracleVM system is missing necessary patches to address
    critical security updates :
    
      - don't generate weak control key for resolver
        (CVE-2014-9293)
    
      - don't generate weak MD5 keys in ntp-keygen
        (CVE-2014-9294)
    
      - fix buffer overflows via specially-crafted packets
        (CVE-2014-9295)
    
      - don't mobilize passive association when authentication
        fails (CVE-2014-9296)"
      );
      # https://oss.oracle.com/pipermail/oraclevm-errata/2014-December/000249.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?12c3462c"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected ntp / ntpdate packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:vm:ntp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:vm:ntpdate");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:vm_server:3.3");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/12/19");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/12/24");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/12/26");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"OracleVM Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/OracleVM/release", "Host/OracleVM/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/OracleVM/release");
    if (isnull(release) || "OVS" >!< release) audit(AUDIT_OS_NOT, "OracleVM");
    if (! preg(pattern:"^OVS" + "3\.3" + "(\.[0-9]|$)", string:release)) audit(AUDIT_OS_NOT, "OracleVM 3.3", "OracleVM " + release);
    if (!get_kb_item("Host/OracleVM/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "OracleVM", cpu);
    if ("x86_64" >!< cpu) audit(AUDIT_ARCH_NOT, "x86_64", cpu);
    
    flag = 0;
    if (rpm_check(release:"OVS3.3", reference:"ntp-4.2.6p5-2.el6_6")) flag++;
    if (rpm_check(release:"OVS3.3", reference:"ntpdate-4.2.6p5-2.el6_6")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ntp / ntpdate");
    }
    
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2015-003.NASL
    descriptionUpdated ntp packages fix security vulnerabilities : If no authentication key is defined in the ntp.conf file, a cryptographically-weak default key is generated (CVE-2014-9293). ntp-keygen before 4.2.7p230 uses a non-cryptographic random number generator with a weak seed to generate symmetric keys (CVE-2014-9294). A remote unauthenticated attacker may craft special packets that trigger buffer overflows in the ntpd functions crypto_recv() (when using autokey authentication), ctl_putdata(), and configure(). The resulting buffer overflows may be exploited to allow arbitrary malicious code to be executed with the privilege of the ntpd process (CVE-2014-9295). A section of code in ntpd handling a rare error is missing a return statement, therefore processing did not stop when the error was encountered. This situation may be exploitable by an attacker (CVE-2014-9296). The ntp package has been patched to fix these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id80384
    published2015-01-06
    reporterThis script is Copyright (C) 2015-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/80384
    titleMandriva Linux Security Advisory : ntp (MDVSA-2015:003)
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Mandriva Linux Security Advisory MDVSA-2015:003. 
    # The text itself is copyright (C) Mandriva S.A.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(80384);
      script_version("1.10");
      script_cvs_date("Date: 2019/08/02 13:32:56");
    
      script_cve_id("CVE-2014-9293", "CVE-2014-9294", "CVE-2014-9295", "CVE-2014-9296");
      script_bugtraq_id(71757, 71758, 71761, 71762);
      script_xref(name:"MDVSA", value:"2015:003");
    
      script_name(english:"Mandriva Linux Security Advisory : ntp (MDVSA-2015:003)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Mandriva Linux host is missing one or more security
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated ntp packages fix security vulnerabilities :
    
    If no authentication key is defined in the ntp.conf file, a
    cryptographically-weak default key is generated (CVE-2014-9293).
    
    ntp-keygen before 4.2.7p230 uses a non-cryptographic random number
    generator with a weak seed to generate symmetric keys (CVE-2014-9294).
    
    A remote unauthenticated attacker may craft special packets that
    trigger buffer overflows in the ntpd functions crypto_recv() (when
    using autokey authentication), ctl_putdata(), and configure(). The
    resulting buffer overflows may be exploited to allow arbitrary
    malicious code to be executed with the privilege of the ntpd process
    (CVE-2014-9295).
    
    A section of code in ntpd handling a rare error is missing a return
    statement, therefore processing did not stop when the error was
    encountered. This situation may be exploitable by an attacker
    (CVE-2014-9296).
    
    The ntp package has been patched to fix these issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://advisories.mageia.org/MGASA-2014-0541.html"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected ntp, ntp-client and / or ntp-doc packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:ntp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:ntp-client");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:ntp-doc");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:business_server:1");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2015/01/05");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/01/06");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2019 Tenable Network Security, Inc.");
      script_family(english:"Mandriva Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux");
    if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"ntp-4.2.6p5-8.1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"ntp-client-4.2.6p5-8.1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"ntp-doc-4.2.6p5-8.1.mbs1")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2014-2024.NASL
    descriptionFrom Red Hat Security Advisory 2014:2024 : Updated ntp packages that fix several security issues are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Network Time Protocol (NTP) is used to synchronize a computer
    last seen2020-06-01
    modified2020-06-02
    plugin id80154
    published2014-12-22
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/80154
    titleOracle Linux 6 / 7 : ntp (ELSA-2014-2024)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Red Hat Security Advisory RHSA-2014:2024 and 
    # Oracle Linux Security Advisory ELSA-2014-2024 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(80154);
      script_version("1.18");
      script_cvs_date("Date: 2019/09/30 10:58:19");
    
      script_cve_id("CVE-2014-9293", "CVE-2014-9294", "CVE-2014-9295", "CVE-2014-9296");
      script_bugtraq_id(71757, 71758, 71761, 71762);
      script_xref(name:"RHSA", value:"2014:2024");
    
      script_name(english:"Oracle Linux 6 / 7 : ntp (ELSA-2014-2024)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Oracle Linux host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "From Red Hat Security Advisory 2014:2024 :
    
    Updated ntp packages that fix several security issues are now
    available for Red Hat Enterprise Linux 6 and 7.
    
    Red Hat Product Security has rated this update as having Important
    security impact. A Common Vulnerability Scoring System (CVSS) base
    score, which gives a detailed severity rating, is available from the
    CVE link in the References section.
    
    The Network Time Protocol (NTP) is used to synchronize a computer's
    time with a referenced time source.
    
    Multiple buffer overflow flaws were discovered in ntpd's
    crypto_recv(), ctl_putdata(), and configure() functions. A remote
    attacker could use either of these flaws to send a specially crafted
    request packet that could crash ntpd or, potentially, execute
    arbitrary code with the privileges of the ntp user. Note: the
    crypto_recv() flaw requires non-default configurations to be active,
    while the ctl_putdata() flaw, by default, can only be exploited via
    local attackers, and the configure() flaw requires additional
    authentication to exploit. (CVE-2014-9295)
    
    It was found that ntpd automatically generated weak keys for its
    internal use if no ntpdc request authentication key was specified in
    the ntp.conf configuration file. A remote attacker able to match the
    configured IP restrictions could guess the generated key, and possibly
    use it to send ntpdc query or configuration requests. (CVE-2014-9293)
    
    It was found that ntp-keygen used a weak method for generating MD5
    keys. This could possibly allow an attacker to guess generated MD5
    keys that could then be used to spoof an NTP client or server. Note:
    it is recommended to regenerate any MD5 keys that had explicitly been
    generated with ntp-keygen; the default installation does not contain
    such keys). (CVE-2014-9294)
    
    A missing return statement in the receive() function could potentially
    allow a remote attacker to bypass NTP's authentication mechanism.
    (CVE-2014-9296)
    
    All ntp users are advised to upgrade to this updated package, which
    contains backported patches to resolve these issues. After installing
    the update, the ntpd daemon will restart automatically."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://oss.oracle.com/pipermail/el-errata/2014-December/004761.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://oss.oracle.com/pipermail/el-errata/2014-December/004762.html"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected ntp packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:ntp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:ntp-doc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:ntp-perl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:ntpdate");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:sntp");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:linux:6");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:linux:7");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/12/19");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/12/20");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/12/22");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Oracle Linux Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/OracleLinux", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/OracleLinux")) audit(AUDIT_OS_NOT, "Oracle Linux");
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || !pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux)", string:release)) audit(AUDIT_OS_NOT, "Oracle Linux");
    os_ver = pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Oracle Linux");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(6|7)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Oracle Linux 6 / 7", "Oracle Linux " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Oracle Linux", cpu);
    
    flag = 0;
    if (rpm_check(release:"EL6", reference:"ntp-4.2.6p5-2.el6_6")) flag++;
    if (rpm_check(release:"EL6", reference:"ntp-doc-4.2.6p5-2.el6_6")) flag++;
    if (rpm_check(release:"EL6", reference:"ntp-perl-4.2.6p5-2.el6_6")) flag++;
    if (rpm_check(release:"EL6", reference:"ntpdate-4.2.6p5-2.el6_6")) flag++;
    
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"ntp-4.2.6p5-19.el7_0")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"ntp-doc-4.2.6p5-19.el7_0")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"ntp-perl-4.2.6p5-19.el7_0")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"ntpdate-4.2.6p5-19.el7_0")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"sntp-4.2.6p5-19.el7_0")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ntp / ntp-doc / ntp-perl / ntpdate / sntp");
    }
    
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-2449-1.NASL
    descriptionNeel Mehta discovered that NTP generated weak authentication keys. A remote attacker could possibly use this issue to brute force the authentication key and send requests if permitted by IP restrictions. (CVE-2014-9293) Stephen Roettger discovered that NTP generated weak MD5 keys. A remote attacker could possibly use this issue to brute force the MD5 key and spoof a client or server. (CVE-2014-9294) Stephen Roettger discovered that NTP contained buffer overflows in the crypto_recv(), ctl_putdata() and configure() functions. In non-default configurations, a remote attacker could use these issues to cause NTP to crash, resulting in a denial of service, or possibly execute arbitrary code. The default compiler options for affected releases should reduce the vulnerability to a denial of service. In addition, attackers would be isolated by the NTP AppArmor profile. (CVE-2014-9295) Stephen Roettger discovered that NTP incorrectly continued processing when handling certain errors. (CVE-2014-9296). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id80218
    published2014-12-23
    reporterUbuntu Security Notice (C) 2014-2019 Canonical, Inc. / NASL script (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/80218
    titleUbuntu 10.04 LTS / 12.04 LTS / 14.04 LTS / 14.10 : ntp vulnerabilities (USN-2449-1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Ubuntu Security Notice USN-2449-1. The text 
    # itself is copyright (C) Canonical, Inc. See 
    # <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered 
    # trademark of Canonical, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(80218);
      script_version("1.16");
      script_cvs_date("Date: 2019/09/19 12:54:31");
    
      script_cve_id("CVE-2014-9293", "CVE-2014-9294", "CVE-2014-9295", "CVE-2014-9296");
      script_bugtraq_id(71757, 71758, 71761, 71762);
      script_xref(name:"USN", value:"2449-1");
    
      script_name(english:"Ubuntu 10.04 LTS / 12.04 LTS / 14.04 LTS / 14.10 : ntp vulnerabilities (USN-2449-1)");
      script_summary(english:"Checks dpkg output for updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Ubuntu host is missing a security-related patch."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Neel Mehta discovered that NTP generated weak authentication keys. A
    remote attacker could possibly use this issue to brute force the
    authentication key and send requests if permitted by IP restrictions.
    (CVE-2014-9293)
    
    Stephen Roettger discovered that NTP generated weak MD5 keys. A remote
    attacker could possibly use this issue to brute force the MD5 key and
    spoof a client or server. (CVE-2014-9294)
    
    Stephen Roettger discovered that NTP contained buffer overflows in the
    crypto_recv(), ctl_putdata() and configure() functions. In non-default
    configurations, a remote attacker could use these issues to cause NTP
    to crash, resulting in a denial of service, or possibly execute
    arbitrary code. The default compiler options for affected releases
    should reduce the vulnerability to a denial of service. In addition,
    attackers would be isolated by the NTP AppArmor profile.
    (CVE-2014-9295)
    
    Stephen Roettger discovered that NTP incorrectly continued processing
    when handling certain errors. (CVE-2014-9296).
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Ubuntu security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://usn.ubuntu.com/2449-1/"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected ntp package.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:ntp");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:10.04:-:lts");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:12.04:-:lts");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:14.04");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:14.10");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/12/19");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/12/22");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/12/23");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"Ubuntu Security Notice (C) 2014-2019 Canonical, Inc. / NASL script (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Ubuntu Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("ubuntu.inc");
    include("misc_func.inc");
    
    if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/Ubuntu/release");
    if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu");
    release = chomp(release);
    if (! preg(pattern:"^(10\.04|12\.04|14\.04|14\.10)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 10.04 / 12.04 / 14.04 / 14.10", "Ubuntu " + release);
    if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu);
    
    flag = 0;
    
    if (ubuntu_check(osver:"10.04", pkgname:"ntp", pkgver:"1:4.2.4p8+dfsg-1ubuntu2.2")) flag++;
    if (ubuntu_check(osver:"12.04", pkgname:"ntp", pkgver:"1:4.2.6.p3+dfsg-1ubuntu3.2")) flag++;
    if (ubuntu_check(osver:"14.04", pkgname:"ntp", pkgver:"1:4.2.6.p5+dfsg-3ubuntu2.14.04.1")) flag++;
    if (ubuntu_check(osver:"14.10", pkgname:"ntp", pkgver:"1:4.2.6.p5+dfsg-3ubuntu2.14.10.1")) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : ubuntu_report_get()
      );
      exit(0);
    }
    else
    {
      tested = ubuntu_pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ntp");
    }
    
  • NASL familyCGI abuses
    NASL idCISCO-SA-20141222-NTPD-PRSM.NASL
    descriptionAccording to its self-reported version number, the version of Cisco Prime Security Manager running on the remote host is prior to 9.3.3.2. It is, therefore, affected by multiple vulnerabilities in the bundled NTP libraries : - A security weakness exists due to the config_auth() function improperly generating default keys when no authentication key is defined in the
    last seen2020-06-01
    modified2020-06-02
    plugin id81980
    published2015-03-20
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/81980
    titleCisco Prime Security Manager Network Time Protocol Daemon (ntpd) Multiple Vulnerabilities (cisco-sa-20141222-ntpd)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-3108.NASL
    descriptionSeveral vulnerabilities were discovered in the ntp package, an implementation of the Network Time Protocol. - CVE-2014-9293 ntpd generated a weak key for its internal use, with full administrative privileges. Attackers could use this key to reconfigure ntpd (or to exploit other vulnerabilities). - CVE-2014-9294 The ntp-keygen utility generated weak MD5 keys with insufficient entropy. - CVE-2014-9295 ntpd had several buffer overflows (both on the stack and in the data section), allowing remote authenticated attackers to crash ntpd or potentially execute arbitrary code. - CVE-2014-9296 The general packet processing function in ntpd did not handle an error case correctly. The default ntpd configuration in Debian restricts access to localhost (and possible the adjacent network in case of IPv6). Keys explicitly generated by
    last seen2020-03-17
    modified2014-12-23
    plugin id80208
    published2014-12-23
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/80208
    titleDebian DSA-3108-1 : ntp - security update
  • NASL familyCISCO
    NASL idCISCO-SN-CSCUS27229-IOSXR.NASL
    descriptionThe remote Cisco device is running a version of IOS XR software that is affected by the following vulnerabilities : - Errors exist related to weak cryptographic pseudorandom number generation (PRNG), the functions
    last seen2020-06-01
    modified2020-06-02
    plugin id81913
    published2015-03-18
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/81913
    titleCisco IOS XR NCS 6000 Multiple ntpd Vulnerabilities
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-17361.NASL
    descriptionSecurity fix for CVE-2014-9294, CVE-2014-9295, CVE-2014-9293, CVE-2014-9296 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2014-12-22
    plugin id80147
    published2014-12-22
    reporterThis script is Copyright (C) 2014-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/80147
    titleFedora 20 : ntp-4.2.6p5-19.fc20 (2014-17361)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2014-2024.NASL
    descriptionUpdated ntp packages that fix several security issues are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Network Time Protocol (NTP) is used to synchronize a computer
    last seen2020-06-01
    modified2020-06-02
    plugin id80160
    published2014-12-22
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/80160
    titleRHEL 6 / 7 : ntp (RHSA-2014:2024)
  • NASL familyHP-UX Local Security Checks
    NASL idHPUX_PHNE_44236.NASL
    descriptions700_800 11.23 NTP timeservices upgrade plus utilities : Potential security vulnerabilities have been identified with HP-UX running NTP. These could be exploited remotely to execute code, create a Denial of Service (DoS), or other vulnerabilities. References: CVE-2014-9293 - Insufficient Entropy in Pseudo-Random Number Generator (PRNG) (CWE-332) CVE-2014-9294 - Use of Cryptographically Weak PRNG (CWE-338) CVE-2014-9295 - Stack Buffer Overflow (CWE-121) CVE-2014-9296 - Error Conditions, Return Values, Status Codes (CWE-389) CVE-2014-9297 - Improper Check for Unusual or Exceptional Conditions (CWE-754) SSRT101872 VU#852879.
    last seen2020-06-01
    modified2020-06-02
    plugin id82683
    published2015-04-10
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/82683
    titleHP-UX PHNE_44236 : s700_800 11.23 NTP timeservices upgrade plus utilities
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-17367.NASL
    descriptionSecurity fix for CVE-2014-9294, CVE-2014-9295, CVE-2014-9293, CVE-2014-9296 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2014-12-26
    plugin id80237
    published2014-12-26
    reporterThis script is Copyright (C) 2014-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/80237
    titleFedora 21 : ntp-4.2.6p5-25.fc21 (2014-17367)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_4033D82687DD11E490793C970E169BC2.NASL
    descriptionCERT reports : The Network Time Protocol (NTP) provides networked systems with a way to synchronize time for various services and applications. ntpd version 4.2.7 and previous versions allow attackers to overflow several buffers in a way that may allow malicious code to be executed. ntp-keygen prior to version 4.2.7p230 also uses a non-cryptographic random number generator when generating symmetric keys. The buffer overflow vulnerabilities in ntpd may allow a remote unauthenticated attacker to execute arbitrary malicious code with the privilege level of the ntpd process. The weak default key and non-cryptographic random number generator in ntp-keygen may allow an attacker to gain information regarding the integrity checking and authentication encryption schemes.
    last seen2020-06-01
    modified2020-06-02
    plugin id80149
    published2014-12-22
    reporterThis script is Copyright (C) 2014-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/80149
    titleFreeBSD : ntp -- multiple vulnerabilities (4033d826-87dd-11e4-9079-3c970e169bc2)
  • NASL familyFirewalls
    NASL idCHECK_POINT_GAIA_SK103825.NASL
    descriptionThe remote host is running a version of Gaia Operating System that is prior to R77.20 and thus, is potentially affected by multiple NTP client vulnerabilities. Note that NTP client is disabled by default. Further note that if the vendor
    last seen2020-06-01
    modified2020-06-02
    plugin id105085
    published2017-12-07
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/105085
    titleCheck Point Gaia Operating System < R77.20 Multiple NTP Client Vulnerabilities (sk103825)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201412-34.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201412-34 (NTP: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in NTP. Please review the CVE identifiers referenced below for details. Impact : A remote unauthenticated attacker may be able to execute arbitrary code with the privileges of the process, cause a Denial of Service condition, and obtain sensitive information that could assist in other attacks. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id80239
    published2014-12-26
    reporterThis script is Copyright (C) 2014-2015 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/80239
    titleGLSA-201412-34 : NTP: Multiple vulnerabilities
  • NASL familyF5 Networks Local Security Checks
    NASL idF5_BIGIP_SOL15936.NASL
    descriptionMultiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata function, and (3) the configure function.
    last seen2020-06-01
    modified2020-06-02
    plugin id81557
    published2015-02-27
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/81557
    titleF5 Networks BIG-IP : NTP vulnerability (SOL15936)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2014-792.NASL
    descriptionThe network timeservice ntp was updated to fix critical security issues (bnc#910764, CERT VU#852879) - A potential remote code execution problem was found inside ntpd. The functions crypto_recv() (when using autokey authentication), ctl_putdata(), and configure() where updated to avoid buffer overflows that could be exploited. (CVE-2014-9295) - Furthermore a problem inside the ntpd error handling was found that is missing a return statement. This could also lead to a potentially attack vector. (CVE-2014-9296)
    last seen2020-06-05
    modified2014-12-22
    plugin id80151
    published2014-12-22
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/80151
    titleopenSUSE Security Update : ntp (openSUSE-SU-2014:1670-1)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2014-2025.NASL
    descriptionFrom Red Hat Security Advisory 2014:2025 : Updated ntp packages that fix several security issues are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Network Time Protocol (NTP) is used to synchronize a computer
    last seen2020-06-01
    modified2020-06-02
    plugin id80155
    published2014-12-22
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/80155
    titleOracle Linux 5 : ntp (ELSA-2014-2025)
  • NASL familyAIX Local Security Checks
    NASL idAIX_IV68429.NASL
    descriptionCVE-2014-9293 If no authentication key is defined in the ntp.conf file, a cryptographically-weak default key is generated. CVE-2014-9294 ntp-keygen before 4.2.7p230 uses a non-cryptographic random number generator with a weak seed to generate symmetric keys. CVE-2014-9295 A remote unauthenticated attacker may craft special packets that trigger buffer overflow.
    last seen2020-06-01
    modified2020-06-02
    plugin id81274
    published2015-02-11
    reporterThis script is Copyright (C) 2015 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/81274
    titleAIX 7.1 TL 2 : ntp (IV68429)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-116.NASL
    descriptionSeveral vulnerabilities were discovered in the ntp package, an implementation of the Network Time Protocol. CVE-2014-9293 ntpd generated a weak key for its internal use, with full administrative privileges. Attackers could use this key to reconfigure ntpd (or to exploit other vulnerabilities). CVE-2014-9294 The ntp-keygen utility generated weak MD5 keys with insufficient entropy. CVE-2014-9295 ntpd had several buffer overflows (both on the stack and in the data section), allowing remote authenticated attackers to crash ntpd or potentially execute arbitrary code. CVE-2014-9296 The general packet processing function in ntpd did not handle an error case correctly. The default ntpd configuration in Debian restricts access to localhost (and possible the adjacent network in case of IPv6). Keys explicitly generated by
    last seen2020-03-17
    modified2015-03-26
    plugin id82099
    published2015-03-26
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/82099
    titleDebian DLA-116-1 : ntp security update
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1555.NASL
    descriptionAccording to the versions of the ntp packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities : - It was found that when ntp is configured with rate limiting for all associations the limits are also applied to responses received from its configured sources. A remote attacker who knows the sources can cause a denial of service by preventing ntpd from accepting valid responses from its sources.(CVE-2016-7426) - ntpq in NTP before 4.2.8p7 allows remote attackers to obtain origin timestamps and then impersonate peers via unspecified vectors.(CVE-2015-8139) - A NULL pointer dereference flaw was found in the way ntpd processed
    last seen2020-06-01
    modified2020-06-02
    plugin id125008
    published2019-05-14
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125008
    titleEulerOS Virtualization 3.0.1.0 : ntp (EulerOS-SA-2019-1555)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2014-2024.NASL
    descriptionUpdated ntp packages that fix several security issues are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Network Time Protocol (NTP) is used to synchronize a computer
    last seen2020-06-01
    modified2020-06-02
    plugin id80124
    published2014-12-22
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/80124
    titleCentOS 6 / 7 : ntp (CESA-2014:2024)
  • NASL familyCISCO
    NASL idCISCO_PRIME_LMS_SA-20141222-NTPD.NASL
    descriptionAccording to its self-reported version number, the Cisco Prime LAN Management Solution running on the remote host is affected by multiple vulnerabilities : - A security weakness exists due to the config_auth() function improperly generating default keys when no authentication key is defined in the
    last seen2020-06-01
    modified2020-06-02
    plugin id83877
    published2015-05-28
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/83877
    titleCisco Prime LAN Management Solution ntpd Multiple Vulnerabilities
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20141220_NTP_ON_SL6_X.NASL
    descriptionMultiple buffer overflow flaws were discovered in ntpd
    last seen2020-03-18
    modified2014-12-22
    plugin id80164
    published2014-12-22
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/80164
    titleScientific Linux Security Update : ntp on SL6.x, SL7.x i386/x86_64 (20141220)
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS11_NTP_20150120.NASL
    descriptionThe remote Solaris system is missing necessary patches to address security updates : - Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata function, and (3) the configure function. (CVE-2014-9295) - The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets. (CVE-2014-9296)
    last seen2020-06-01
    modified2020-06-02
    plugin id80934
    published2015-01-23
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/80934
    titleOracle Solaris Third-Party Patch Update : ntp (multiple_vulnerabilities_in_ntp)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2015-140.NASL
    descriptionUpdated ntp packages fix security vulnerabilities : If no authentication key is defined in the ntp.conf file, a cryptographically-weak default key is generated (CVE-2014-9293). ntp-keygen before 4.2.7p230 uses a non-cryptographic random number generator with a weak seed to generate symmetric keys (CVE-2014-9294). A remote unauthenticated attacker may craft special packets that trigger buffer overflows in the ntpd functions crypto_recv() (when using autokey authentication), ctl_putdata(), and configure(). The resulting buffer overflows may be exploited to allow arbitrary malicious code to be executed with the privilege of the ntpd process (CVE-2014-9295). A section of code in ntpd handling a rare error is missing a return statement, therefore processing did not stop when the error was encountered. This situation may be exploitable by an attacker (CVE-2014-9296). Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service (CVE-2014-9297). Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 (localhost) addresses can be bypassed (CVE-2014-9298). The ntp package has been patched to fix these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id82393
    published2015-03-30
    reporterThis script is Copyright (C) 2015-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/82393
    titleMandriva Linux Security Advisory : ntp (MDVSA-2015:140)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2015-0104.NASL
    descriptionUpdated ntp packages that fix several security issues are now available for Red Hat Enterprise Linux 6.5 Extended Update Support. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The Network Time Protocol (NTP) is used to synchronize a computer
    last seen2020-06-01
    modified2020-06-02
    plugin id81071
    published2015-01-29
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/81071
    titleRHEL 6 : ntp (RHSA-2015:0104)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20141220_NTP_ON_SL5_X.NASL
    descriptionMultiple buffer overflow flaws were discovered in ntpd
    last seen2020-03-18
    modified2014-12-22
    plugin id80163
    published2014-12-22
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/80163
    titleScientific Linux Security Update : ntp on SL5.x i386/x86_64 (20141220)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-17395.NASL
    descriptionSecurity fix for CVE-2014-9294, CVE-2014-9295, CVE-2014-9293, CVE-2014-9296 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2015-01-02
    plugin id80310
    published2015-01-02
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/80310
    titleFedora 19 : ntp-4.2.6p5-13.fc19 (2014-17395)
  • NASL familyAIX Local Security Checks
    NASL idAIX_IV68428.NASL
    descriptionCVE-2014-9293 If no authentication key is defined in the ntp.conf file, a cryptographically-weak default key is generated. CVE-2014-9294 ntp-keygen before 4.2.7p230 uses a non-cryptographic random number generator with a weak seed to generate symmetric keys. CVE-2014-9295 A remote unauthenticated attacker may craft special packets that trigger buffer overflow.
    last seen2020-06-01
    modified2020-06-02
    plugin id81273
    published2015-02-11
    reporterThis script is Copyright (C) 2015 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/81273
    titleAIX 6.1 TL 9 : ntp (IV68428)
  • NASL familyCISCO
    NASL idCISCO-SA-20141222-NTPD-NXOS.NASL
    descriptionThe remote Cisco device is running a version of NX-OS software that is affected by the following vulnerabilities : - Errors exist related to weak cryptographic pseudorandom number generation (PRNG), the functions
    last seen2020-06-01
    modified2020-06-02
    plugin id81911
    published2015-03-18
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/81911
    titleCisco NX-OS Multiple ntpd Vulnerabilities
  • NASL familyCISCO
    NASL idCISCO-SA-20141222-NTPD-PRIME_DCNM.NASL
    descriptionAccording to its self-reported version number, the Cisco Prime Data Center Network Manager (DCNM) running on the remote host is affected by multiple vulnerabilities : - A security weakness exists due to the config_auth() function improperly generating default keys when no authentication key is defined in the
    last seen2020-06-01
    modified2020-06-02
    plugin id83876
    published2015-05-28
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/83876
    titleCisco Prime Data Center Network Manager ntpd Multiple Vulnerabilities (uncredentialed check)
  • NASL familySlackware Local Security Checks
    NASL idSLACKWARE_SSA_2014-356-01.NASL
    descriptionNew ntp packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix security issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id80204
    published2014-12-23
    reporterThis script is Copyright (C) 2014-2015 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/80204
    titleSlackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : ntp (SSA:2014-356-01)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2014-2025.NASL
    descriptionUpdated ntp packages that fix several security issues are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Network Time Protocol (NTP) is used to synchronize a computer
    last seen2020-06-01
    modified2020-06-02
    plugin id80161
    published2014-12-22
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/80161
    titleRHEL 5 : ntp (RHSA-2014:2025)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2014-2025.NASL
    descriptionUpdated ntp packages that fix several security issues are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Network Time Protocol (NTP) is used to synchronize a computer
    last seen2020-06-01
    modified2020-06-02
    plugin id80125
    published2014-12-22
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/80125
    titleCentOS 5 : ntp (CESA-2014:2025)
  • NASL familyOracleVM Local Security Checks
    NASL idORACLEVM_OVMSA-2015-0001.NASL
    descriptionThe remote OracleVM system is missing necessary patches to address critical security updates : - Remove default ntp servers in ntp.conf [bug 14342986] - don
    last seen2020-06-01
    modified2020-06-02
    plugin id80394
    published2015-01-07
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/80394
    titleOracleVM 3.2 : ntp (OVMSA-2015-0001)
  • NASL familyAIX Local Security Checks
    NASL idAIX_IV68427.NASL
    descriptionCVE-2014-9293 If no authentication key is defined in the ntp.conf file, a cryptographically-weak default key is generated. CVE-2014-9294 ntp-keygen before 4.2.7p230 uses a non-cryptographic random number generator with a weak seed to generate symmetric keys. CVE-2014-9295 A remote unauthenticated attacker may craft special packets that trigger buffer overflow.
    last seen2020-06-01
    modified2020-06-02
    plugin id81272
    published2015-02-11
    reporterThis script is Copyright (C) 2015 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/81272
    titleAIX 5.3 TL 12 : ntp (IV68427)
  • NASL familyAIX Local Security Checks
    NASL idAIX_IV68430.NASL
    descriptionThe version of NTP installed on the remote AIX host is affected by the following vulnerabilities : - A security weakness exists due to the config_auth() function improperly generating default keys when no authentication key is defined in the ntp.conf file. Key size is limited to 31 bits and the insecure ntp_random() function is used, resulting in cryptographically-weak keys with insufficient entropy. A remote attacker can exploit this to defeat cryptographic protection mechanisms via a brute-force attack. (CVE-2014-9293) - A security weakness exists due the use of a weak seed to prepare a random number generator used to generate symmetric keys. This allows a remote attacker to defeat cryptographic protection mechanisms via a brute-force attack. (CVE-2014-9294) - Multiple stack-based buffer overflow conditions exist due to improper validation of user-supplied input when handling packets in the crypto_recv(), ctl_putdata(), and configure() functions when using autokey authentication. A remote attacker can exploit this, via a specially crafted packet, to cause a denial of service condition or the execution of arbitrary code. (CVE-2014-9295)
    last seen2020-06-01
    modified2020-06-02
    plugin id81275
    published2015-02-11
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/81275
    titleAIX 7.1 TL 3 : ntp (IV68430)
  • NASL familyCISCO
    NASL idCISCO-SN-CSCUS26956-IOSXR.NASL
    descriptionThe remote Cisco device is running a version of IOS XR software that is affected by the following vulnerabilities : - Errors exist related to weak cryptographic pseudorandom number generation (PRNG), the functions
    last seen2020-06-01
    modified2020-06-02
    plugin id81912
    published2015-03-18
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/81912
    titleCisco IOS XR Multiple ntpd Vulnerabilities
  • NASL familyAIX Local Security Checks
    NASL idAIX_IV68426.NASL
    descriptionCVE-2014-9293 If no authentication key is defined in the ntp.conf file, a cryptographically-weak default key is generated. CVE-2014-9294 ntp-keygen before 4.2.7p230 uses a non-cryptographic random number generator with a weak seed to generate symmetric keys. CVE-2014-9295 A remote unauthenticated attacker may craft special packets that trigger buffer overflow.
    last seen2020-06-01
    modified2020-06-02
    plugin id81271
    published2015-02-11
    reporterThis script is Copyright (C) 2015 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/81271
    titleAIX 6.1 TL 8 : ntp (IV68426)

Redhat

advisories
  • bugzilla
    id1176037
    titleCVE-2014-9295 ntp: Multiple buffer overflows via specially-crafted packets
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 5 is installed
        ovaloval:com.redhat.rhba:tst:20070331005
      • commentntp is earlier than 0:4.2.2p1-18.el5_11
        ovaloval:com.redhat.rhsa:tst:20142025001
      • commentntp is signed with Red Hat redhatrelease key
        ovaloval:com.redhat.rhsa:tst:20090046005
    rhsa
    idRHSA-2014:2025
    released2014-12-20
    severityImportant
    titleRHSA-2014:2025: ntp security update (Important)
  • rhsa
    idRHSA-2015:0104
rpms
  • ntp-0:4.2.6p5-19.el7_0
  • ntp-0:4.2.6p5-2.el6_6
  • ntp-debuginfo-0:4.2.6p5-19.el7_0
  • ntp-debuginfo-0:4.2.6p5-2.el6_6
  • ntp-doc-0:4.2.6p5-19.el7_0
  • ntp-doc-0:4.2.6p5-2.el6_6
  • ntp-perl-0:4.2.6p5-19.el7_0
  • ntp-perl-0:4.2.6p5-2.el6_6
  • ntpdate-0:4.2.6p5-19.el7_0
  • ntpdate-0:4.2.6p5-2.el6_6
  • sntp-0:4.2.6p5-19.el7_0
  • ntp-0:4.2.2p1-18.el5_11
  • ntp-debuginfo-0:4.2.2p1-18.el5_11
  • ntp-0:4.2.6p5-2.el6_5
  • ntp-debuginfo-0:4.2.6p5-2.el6_5
  • ntp-doc-0:4.2.6p5-2.el6_5
  • ntp-perl-0:4.2.6p5-2.el6_5
  • ntpdate-0:4.2.6p5-2.el6_5

The Hacker News

idTHN:0EEA24CF23823F464A5684736E24DA65
last seen2018-01-27
modified2014-12-24
published2014-12-23
reporterMohit Kumar
sourcehttps://thehackernews.com/2014/12/Apple-Mac-Security-Patch.html
titleFirst Time Ever Apple Automatically Pushes Security Patch for Mac OS

References