CVE-2016-9042

Impact:
Moderate
Public Date:
2017-03-21
IAVA:
2017-A-0084
CWE:
CWE-20
Bugzilla:
1434017: CVE-2016-9042 ntp: DoS via origin timestamp check functionality
A vulnerability was found in NTP, affecting the origin timestamp check function. An attacker able to spoof messages from all of the configured peers could send crafted packets to ntpd, causing later replies from those peers to be discarded, resulting in denial of service.

Find out more about CVE-2016-9042 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 5.9
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector Network
Attack Complexity High
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality None
Integrity Impact None
Availability Impact High

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 7 ntp Not affected
Red Hat Enterprise Linux 6 ntp Not affected
Red Hat Enterprise Linux 5 ntp Not affected

Acknowledgements

Red Hat would like to thank the NTP project for reporting this issue. Upstream acknowledges Matthew Van Gundy (Cisco) as the original reporter.

Mitigation

Implement BCP-38.

Configure enough servers/peers that an attacker cannot target all of your time sources.

Properly monitor your ntpd instances, and auto-restart ntpd (without -g) if it stops running.

External References

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.