{
  "threat_severity" : "Moderate",
  "public_date" : "2015-10-21T00:00:00Z",
  "bugzilla" : {
    "description" : "ntp: MITM attacker can force ntpd to make a step larger than the panic threshold",
    "id" : "1271076",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1271076"
  },
  "cvss" : {
    "cvss_base_score" : "4.3",
    "cvss_scoring_vector" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-20",
  "details" : [ "The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).", "It was found that ntpd did not correctly implement the threshold limitation for the '-g' option, which is used to set the time without any restrictions. A man-in-the-middle attacker able to intercept NTP traffic between a connecting client and an NTP server could use this flaw to force that client to make multiple steps larger than the panic threshold, effectively changing the time to an arbitrary value at any time." ],
  "statement" : "Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/",
  "acknowledgement" : "Red Hat would like to thank Aanchal Malhotra (Boston University), Isaac E. Cohen (Boston University), and Sharon Goldberg (Boston University) for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2015-10-26T00:00:00Z",
    "advisory" : "RHSA-2015:1930",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "ntp-0:4.2.6p5-5.el6_7.2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2015-10-26T00:00:00Z",
    "advisory" : "RHSA-2015:1930",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "ntp-0:4.2.6p5-19.ael7b_1.3"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Will not fix",
    "package_name" : "ntp",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2015-5300\nhttps://nvd.nist.gov/vuln/detail/CVE-2015-5300\nhttps://www.cs.bu.edu/~goldbe/NTPattack.html" ],
  "name" : "CVE-2015-5300",
  "csaw" : false
}