Vulnerabilities > CVE-2018-7185
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association.
Vulnerable Configurations
Nessus
NASL family SuSE Local Security Checks NASL id SUSE_SU-2018-1765-1.NASL description This update for ntp fixes the following issues : - Update to 4.2.8p11 (bsc#1082210) : - CVE-2016-1549: Sybil vulnerability: ephemeral association attack. While fixed in ntp-4.2.8p7, there are significant additional protections for this issue in 4.2.8p11. - CVE-2018-7182: ctl_getitem(): buffer read overrun leads to undefined behavior and information leak. (bsc#1083426) - CVE-2018-7170: Multiple authenticated ephemeral associations. (bsc#1083424) - CVE-2018-7184: Interleaved symmetric mode cannot recover from bad state. (bsc#1083422) - CVE-2018-7185: Unauthenticated packet can reset authenticated interleaved association. (bsc#1083420) - CVE-2018-7183: ntpq:decodearr() can write beyond its buffer limit.(bsc#1083417) - Don last seen 2020-06-01 modified 2020-06-02 plugin id 110639 published 2018-06-21 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/110639 title SUSE SLED12 / SLES12 Security Update : ntp (SUSE-SU-2018:1765-1) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from SUSE update advisory SUSE-SU-2018:1765-1. # The text itself is copyright (C) SUSE. # include("compat.inc"); if (description) { script_id(110639); script_version("1.9"); script_cvs_date("Date: 2019/09/10 13:51:48"); script_cve_id("CVE-2016-1549", "CVE-2018-7170", "CVE-2018-7182", "CVE-2018-7183", "CVE-2018-7184", "CVE-2018-7185"); script_name(english:"SUSE SLED12 / SLES12 Security Update : ntp (SUSE-SU-2018:1765-1)"); script_summary(english:"Checks rpm output for the updated packages."); script_set_attribute( attribute:"synopsis", value:"The remote SUSE host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "This update for ntp fixes the following issues : - Update to 4.2.8p11 (bsc#1082210) : - CVE-2016-1549: Sybil vulnerability: ephemeral association attack. While fixed in ntp-4.2.8p7, there are significant additional protections for this issue in 4.2.8p11. - CVE-2018-7182: ctl_getitem(): buffer read overrun leads to undefined behavior and information leak. (bsc#1083426) - CVE-2018-7170: Multiple authenticated ephemeral associations. (bsc#1083424) - CVE-2018-7184: Interleaved symmetric mode cannot recover from bad state. (bsc#1083422) - CVE-2018-7185: Unauthenticated packet can reset authenticated interleaved association. (bsc#1083420) - CVE-2018-7183: ntpq:decodearr() can write beyond its buffer limit.(bsc#1083417) - Don't use libevent's cached time stamps in sntp. (bsc#1077445) This update is a reissue of the previous update with LTSS channels included. Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1077445" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1082063" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1082210" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1083417" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1083420" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1083422" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1083424" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1083426" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-1549/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-7170/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-7182/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-7183/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-7184/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-7185/" ); # https://www.suse.com/support/update/announcement/2018/suse-su-20181765-1/ script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?2c461920" ); script_set_attribute( attribute:"solution", value: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or 'zypper patch'. Alternatively you can run the command listed for your product : SUSE OpenStack Cloud 7:zypper in -t patch SUSE-OpenStack-Cloud-7-2018-1188=1 SUSE Linux Enterprise Server for SAP 12-SP2:zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-1188=1 SUSE Linux Enterprise Server for SAP 12-SP1:zypper in -t patch SUSE-SLE-SAP-12-SP1-2018-1188=1 SUSE Linux Enterprise Server 12-SP3:zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-1188=1 SUSE Linux Enterprise Server 12-SP2-LTSS:zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-1188=1 SUSE Linux Enterprise Server 12-SP1-LTSS:zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-1188=1 SUSE Linux Enterprise Desktop 12-SP3:zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-1188=1 SUSE Enterprise Storage 4:zypper in -t patch SUSE-Storage-4-2018-1188=1 SUSE CaaS Platform ALL : To install this update, use the SUSE CaaS Platform Velum dashboard. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ntp"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ntp-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ntp-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ntp-doc"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:12"); script_set_attribute(attribute:"vuln_publication_date", value:"2017/01/06"); script_set_attribute(attribute:"patch_publication_date", value:"2018/06/20"); script_set_attribute(attribute:"plugin_publication_date", value:"2018/06/21"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE"); os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE"); os_ver = os_ver[1]; if (! preg(pattern:"^(SLED12|SLES12)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLED12 / SLES12", "SUSE " + os_ver); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu); sp = get_kb_item("Host/SuSE/patchlevel"); if (isnull(sp)) sp = "0"; if (os_ver == "SLES12" && (! preg(pattern:"^(1|2|3)$", string:sp))) audit(AUDIT_OS_NOT, "SLES12 SP1/2/3", os_ver + " SP" + sp); if (os_ver == "SLED12" && (! preg(pattern:"^(3)$", string:sp))) audit(AUDIT_OS_NOT, "SLED12 SP3", os_ver + " SP" + sp); flag = 0; if (rpm_check(release:"SLES12", sp:"1", reference:"ntp-4.2.8p11-64.5.1")) flag++; if (rpm_check(release:"SLES12", sp:"1", reference:"ntp-debuginfo-4.2.8p11-64.5.1")) flag++; if (rpm_check(release:"SLES12", sp:"1", reference:"ntp-debugsource-4.2.8p11-64.5.1")) flag++; if (rpm_check(release:"SLES12", sp:"1", reference:"ntp-doc-4.2.8p11-64.5.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"ntp-4.2.8p11-64.5.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"ntp-debuginfo-4.2.8p11-64.5.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"ntp-debugsource-4.2.8p11-64.5.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"ntp-doc-4.2.8p11-64.5.1")) flag++; if (rpm_check(release:"SLES12", sp:"2", reference:"ntp-4.2.8p11-64.5.1")) flag++; if (rpm_check(release:"SLES12", sp:"2", reference:"ntp-debuginfo-4.2.8p11-64.5.1")) flag++; if (rpm_check(release:"SLES12", sp:"2", reference:"ntp-debugsource-4.2.8p11-64.5.1")) flag++; if (rpm_check(release:"SLES12", sp:"2", reference:"ntp-doc-4.2.8p11-64.5.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"ntp-4.2.8p11-64.5.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"ntp-debuginfo-4.2.8p11-64.5.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"ntp-debugsource-4.2.8p11-64.5.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"ntp-doc-4.2.8p11-64.5.1")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ntp"); }
NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-3707-1.NASL description Yihan Lian discovered that NTP incorrectly handled certain malformed mode 6 packets. A remote attacker could possibly use this issue to cause ntpd to crash, resulting in a denial of service. This issue only affected Ubuntu 17.10 and Ubuntu 18.04 LTS. (CVE-2018-7182) Michael Macnair discovered that NTP incorrectly handled certain responses. A remote attacker could possibly use this issue to execute arbitrary code. (CVE-2018-7183) Miroslav Lichvar discovered that NTP incorrectly handled certain zero-origin timestamps. A remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 17.10 and Ubuntu 18.04 LTS. (CVE-2018-7184) Miroslav Lichvar discovered that NTP incorrectly handled certain zero-origin timestamps. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2018-7185). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 110974 published 2018-07-10 reporter Ubuntu Security Notice (C) 2018-2019 Canonical, Inc. / NASL script (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/110974 title Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : ntp vulnerabilities (USN-3707-1) NASL family Huawei Local Security Checks NASL id EULEROS_SA-2019-1719.NASL description According to the versions of the ntp packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests. - Mitigation:Do not add the last seen 2020-05-06 modified 2019-07-22 plugin id 126847 published 2019-07-22 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/126847 title EulerOS 2.0 SP2 : ntp (EulerOS-SA-2019-1719) NASL family Amazon Linux Local Security Checks NASL id AL2_ALAS-2018-1009.NASL description Ephemeral association time spoofing additional protection ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim last seen 2020-06-01 modified 2020-06-02 plugin id 109688 published 2018-05-11 reporter This script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/109688 title Amazon Linux 2 : ntp (ALAS-2018-1009) NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_AF485EF41C5811E88477D05099C0AE8C.NASL description Network Time Foundation reports : The NTP Project at Network Time Foundation is releasing ntp-4.2.8p11. This release addresses five security issues in ntpd : - LOW/MEDIUM: Sec 3012 / CVE-2016-1549 / VU#961909: Sybil vulnerability: ephemeral association attack - INFO/MEDIUM: Sec 3412 / CVE-2018-7182 / VU#961909 : ctl_getitem(): buffer read overrun leads to undefined behavior and information leak - LOW: Sec 3415 / CVE-2018-7170 / VU#961909: Multiple authenticated ephemeral associations - LOW: Sec 3453 / CVE-2018-7184 / VU#961909: Interleaved symmetric mode cannot recover from bad state - LOW/MEDIUM: Sec 3454 / CVE-2018-7185 / VU#961909 : Unauthenticated packet can reset authenticated interleaved association one security issue in ntpq : - MEDIUM: Sec 3414 / CVE-2018-7183 / VU#961909 : ntpq:decodearr() can write beyond its buffer limit and provides over 33 bugfixes and 32 other improvements. last seen 2020-06-01 modified 2020-06-02 plugin id 107046 published 2018-02-28 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/107046 title FreeBSD : ntp -- multiple vulnerabilities (af485ef4-1c58-11e8-8477-d05099c0ae8c) NASL family Huawei Local Security Checks NASL id EULEROS_SA-2019-1323.NASL description According to the versions of the ntp packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests. - Mitigation:Do not add the last seen 2020-05-06 modified 2019-05-01 plugin id 124450 published 2019-05-01 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/124450 title EulerOS 2.0 SP5 : ntp (EulerOS-SA-2019-1323) NASL family Amazon Linux Local Security Checks NASL id ALA_ALAS-2018-1009.NASL description Ephemeral association time spoofing additional protection ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim last seen 2020-06-01 modified 2020-06-02 plugin id 109697 published 2018-05-11 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/109697 title Amazon Linux AMI : ntp (ALAS-2018-1009) NASL family Slackware Local Security Checks NASL id SLACKWARE_SSA_2018-060-02.NASL description New ntp packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues. last seen 2020-06-01 modified 2020-06-02 plugin id 107103 published 2018-03-02 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/107103 title Slackware 14.0 / 14.1 / 14.2 / current : ntp (SSA:2018-060-02) NASL family Huawei Local Security Checks NASL id EULEROS_SA-2019-2066.NASL description According to the versions of the ntp packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests. - Mitigation:Do not add the last seen 2020-05-08 modified 2019-09-24 plugin id 129259 published 2019-09-24 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/129259 title EulerOS 2.0 SP3 : ntp (EulerOS-SA-2019-2066) NASL family PhotonOS Local Security Checks NASL id PHOTONOS_PHSA-2018-1_0-0167_NTP.NASL description An update of the ntp package has been released. last seen 2020-06-01 modified 2020-06-02 plugin id 121863 published 2019-02-07 reporter This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/121863 title Photon OS 1.0: Ntp PHSA-2018-1.0-0167 NASL family PhotonOS Local Security Checks NASL id PHOTONOS_PHSA-2018-1_0-0167.NASL description An update of 'vim', 'ntp', 'openjdk', 'libmspack', 'blktrace', 'systemd', 'perl' packages of Photon OS has been released. last seen 2019-02-21 modified 2019-02-07 plugin id 111946 published 2018-08-17 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=111946 title Photon OS 1.0: Blktrace / Libmspack / Ntp / Openjdk / Perl / Systemd / Vim PHSA-2018-1.0-0167 (deprecated) NASL family SuSE Local Security Checks NASL id SUSE_SU-2018-0808-1.NASL description This update for ntp fixes the following issues: Security issues fixed : - CVE-2016-1549: Significant additional protections against CVE-2016-1549 that was fixed in ntp-4.2.8p7 (bsc#1082210). - CVE-2018-7170: Ephemeral association time spoofing additional protection (bsc#1083424). - CVE-2018-7182: Buffer read overrun leads information leak in ctl_getitem() (bsc#1083426). - CVE-2018-7183: decodearr() can write beyond its buffer limit (bsc#1083417). - CVE-2018-7184: Interleaved symmetric mode cannot recover from bad state (bsc#1083422). - CVE-2018-7185: Unauthenticated packet can reset authenticated interleaved association (bsc#1083420). Bug fixes : - bsc#1077445: Don last seen 2020-06-01 modified 2020-06-02 plugin id 108651 published 2018-03-27 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/108651 title SUSE SLES11 Security Update : ntp (SUSE-SU-2018:0808-1) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201805-12.NASL description The remote host is affected by the vulnerability described in GLSA-201805-12 (NTP: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in NTP. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could possibly execute arbitrary code or cause a Denial of Service condition. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 110176 published 2018-05-29 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/110176 title GLSA-201805-12 : NTP: Multiple vulnerabilities NASL family SuSE Local Security Checks NASL id SUSE_SU-2018-0956-1.NASL description This update for ntp fixes the following issues : - Update to 4.2.8p11 (bsc#1082210) : - CVE-2016-1549: Sybil vulnerability: ephemeral association attack. While fixed in ntp-4.2.8p7, there are significant additional protections for this issue in 4.2.8p11. - CVE-2018-7182: ctl_getitem(): buffer read overrun leads to undefined behavior and information leak. (bsc#1083426) - CVE-2018-7170: Multiple authenticated ephemeral associations. (bsc#1083424) - CVE-2018-7184: Interleaved symmetric mode cannot recover from bad state. (bsc#1083422) - CVE-2018-7185: Unauthenticated packet can reset authenticated interleaved association. (bsc#1083420) - CVE-2018-7183: ntpq:decodearr() can write beyond its buffer limit.(bsc#1083417) - Don last seen 2020-06-01 modified 2020-06-02 plugin id 109085 published 2018-04-17 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/109085 title SUSE SLED12 / SLES12 Security Update : ntp (SUSE-SU-2018:0956-1) NASL family SuSE Local Security Checks NASL id OPENSUSE-2018-376.NASL description This update for ntp fixes the following issues : - Update to 4.2.8p11 (bsc#1082210) : - CVE-2016-1549: Sybil vulnerability: ephemeral association attack. While fixed in ntp-4.2.8p7, there are significant additional protections for this issue in 4.2.8p11. - CVE-2018-7182: ctl_getitem(): buffer read overrun leads to undefined behavior and information leak. (bsc#1083426) - CVE-2018-7170: Multiple authenticated ephemeral associations. (bsc#1083424) - CVE-2018-7184: Interleaved symmetric mode cannot recover from bad state. (bsc#1083422) - CVE-2018-7185: Unauthenticated packet can reset authenticated interleaved association. (bsc#1083420) - CVE-2018-7183: ntpq:decodearr() can write beyond its buffer limit.(bsc#1083417) - Don last seen 2020-06-05 modified 2018-04-18 plugin id 109102 published 2018-04-18 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/109102 title openSUSE Security Update : ntp (openSUSE-2018-376) NASL family SuSE Local Security Checks NASL id SUSE_SU-2018-1464-1.NASL description This update for ntp fixes the following issues : - Update to 4.2.8p11 (bsc#1082210) : - CVE-2016-1549: Sybil vulnerability: ephemeral association attack. While fixed in ntp-4.2.8p7, there are significant additional protections for this issue in 4.2.8p11. - CVE-2018-7182: ctl_getitem(): buffer read overrun leads to undefined behavior and information leak. (bsc#1083426) - CVE-2018-7170: Multiple authenticated ephemeral associations. (bsc#1083424) - CVE-2018-7184: Interleaved symmetric mode cannot recover from bad state. (bsc#1083422) - CVE-2018-7185: Unauthenticated packet can reset authenticated interleaved association. (bsc#1083420) - CVE-2018-7183: ntpq:decodearr() can write beyond its buffer limit.(bsc#1083417) - Don last seen 2020-06-01 modified 2020-06-02 plugin id 110224 published 2018-05-30 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/110224 title SUSE SLES12 Security Update : ntp (SUSE-SU-2018:1464-1) NASL family Misc. NASL id NTP_4_2_8P11.NASL description The version of the remote NTP server is 4.x prior to 4.2.8p11. It is, therefore, affected by multiple vulnerabilities, which allow denial of service attacks, information disclosure and possibly, remote code execution. last seen 2020-06-01 modified 2020-06-02 plugin id 107258 published 2018-03-09 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/107258 title Network Time Protocol Daemon (ntpd) 4.x < 4.2.8p11 Multiple Vulnerabilities NASL family Huawei Local Security Checks NASL id EULEROS_SA-2019-1557.NASL description According to the versions of the ntp packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities : - It was found that ntpd did not check whether a Message Authentication Code (MAC) was present in a received packet when ntpd was configured to use symmetric cryptographic keys. A man-in-the-middle attacker could use this flaw to send crafted packets that would be accepted by a client or a peer without the attacker knowing the symmetric key.(CVE-2015-1798) - A missing return statement in the receive() function could potentially allow a remote attacker to bypass NTP last seen 2020-06-01 modified 2020-06-02 plugin id 125010 published 2019-05-14 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/125010 title EulerOS Virtualization 3.0.1.0 : ntp (EulerOS-SA-2019-1557) NASL family SuSE Local Security Checks NASL id SUSE_SU-2018-1765-2.NASL description This update for ntp fixes the following issues : Update to 4.2.8p11 (bsc#1082210) : - CVE-2016-1549: Sybil vulnerability: ephemeral association attack. While fixed in ntp-4.2.8p7, there are significant additional protections for this issue in 4.2.8p11. - CVE-2018-7182: ctl_getitem(): buffer read overrun leads to undefined behavior and information leak. (bsc#1083426) - CVE-2018-7170: Multiple authenticated ephemeral associations. (bsc#1083424) - CVE-2018-7184: Interleaved symmetric mode cannot recover from bad state. (bsc#1083422) - CVE-2018-7185: Unauthenticated packet can reset authenticated interleaved association. (bsc#1083420) - CVE-2018-7183: ntpq:decodearr() can write beyond its buffer limit.(bsc#1083417) Don last seen 2020-06-01 modified 2020-06-02 plugin id 118269 published 2018-10-22 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/118269 title SUSE SLES12 Security Update : ntp (SUSE-SU-2018:1765-2) NASL family Huawei Local Security Checks NASL id EULEROS_SA-2019-1222.NASL description According to the versions of the ntp packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities : - The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.i1/4^CVE-2015-7705i1/4%0 - The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.i1/4^CVE-2015-7853i1/4%0 - Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.i1/4^CVE-2015-7871i1/4%0 - The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the last seen 2020-03-19 modified 2019-04-09 plugin id 123908 published 2019-04-09 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/123908 title EulerOS Virtualization 2.5.3 : ntp (EulerOS-SA-2019-1222)
References
- http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html
- http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html
- http://support.ntp.org/bin/view/Main/NtpBug3454
- http://support.ntp.org/bin/view/Main/NtpBug3454
- http://www.securityfocus.com/archive/1/541824/100/0/threaded
- http://www.securityfocus.com/archive/1/541824/100/0/threaded
- http://www.securityfocus.com/bid/103339
- http://www.securityfocus.com/bid/103339
- https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc
- https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc
- https://security.gentoo.org/glsa/201805-12
- https://security.gentoo.org/glsa/201805-12
- https://security.netapp.com/advisory/ntap-20180626-0001/
- https://security.netapp.com/advisory/ntap-20180626-0001/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- https://usn.ubuntu.com/3707-1/
- https://usn.ubuntu.com/3707-1/
- https://usn.ubuntu.com/3707-2/
- https://usn.ubuntu.com/3707-2/
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.synology.com/support/security/Synology_SA_18_13
- https://www.synology.com/support/security/Synology_SA_18_13