CVE-2015-7978

Impact:
Moderate
Public Date:
2016-01-20
CWE:
CWE-121
Bugzilla:
1300270: CVE-2015-7978 ntp: stack exhaustion in recursive traversal of restriction list
A stack-based buffer overflow flaw was found in the way ntpd processed 'ntpdc reslist' commands that queried restriction lists with a large amount of entries. A remote attacker could use this flaw to crash ntpd.

Find out more about CVE-2015-7978 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue affects the versions of ntp as shipped with Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue in Red Hat Enterprise Linux 6 and 7. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

CVSS v2 metrics

Base Score 4.3
Base Metrics AV:N/AC:M/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 6 (ntp) RHSA-2016:0780 2016-05-10
Red Hat Enterprise Linux 7 (ntp) RHSA-2016:2583 2016-11-03

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 5 ntp Will not fix

Mitigation

Keep the number of restriction list entries in ntp.conf lower than 500.

External References

Last Modified