October 2015 NTP Security Vulnerability Announcement
Environment
- Red Hat Enterprise Linux
- ntp-4.2.6p5
Issue
- NTP Vulnerability Announcement October 21st 2015
Red Hat Security Bugzillas Rated Important
Bug 1274265 - CVE-2015-7871 - ntp: crypto-NAK symmetric association authentication bypass vulnerability
Bug 1271070 - (CVE-2015-7704) CVE-2015-7704 - ntp: disabling synchronization via crafted KoD packet
Red Hat Security Bugzillas Rated Moderate
Bug 1274263 - (CVE-2015-7854) CVE-2015-7854 ntp: password length memory corruption vulnerability
Bug 1274262 - (CVE-2015-7853) CVE-2015-7853 ntp: reference clock memory corruption vulnerability
Bug 1274261 - (CVE-2015-7852) CVE-2015-7852 ntp: ntpq atoascii memory corruption vulnerability
Bug 1274260 - (CVE-2015-7851) CVE-2015-7851 ntp: saveconfig directory traversal vulnerability
Bug 1274257 - (CVE-2015-7849) CVE-2015-7849 ntp: trusted keys memory corruption vulnerability
Bug 1274256 - (CVE-2015-7848) CVE-2015-7848 ntp: multiple integer overflow read access violations
Bug 1274255 - (CVE-2015-7701) CVE-2015-7701 ntp: unspecified slow memory leak in CRYPTO_ASSOC
Bug 1274184 - (CVE-2015-7705) CVE-2015-7705 ntp: denial of service by trigerring rate limiting on NTP server
Bug 1274254 - (CVE-2015-7691, CVE-2015-7692, CVE-2015-7702) CVE-2015-7691 CVE-2015-7692 CVE-2015-7702 ntp: incomplete checks in ntp_crypto.c
Red Hat Security Bugzillas Rated Low
Bug 1274264 - (CVE-2015-7855) CVE-2015-7855 ntp: ASSERT in decodenetnum() on invalid values
Bug 1274258 - (CVE-2015-7850) CVE-2015-7850 ntp: remote configuration denial of service vulnerability
Bug 1254547 - (CVE-2015-7703) CVE-2015-7703 ntp: config command can be used to set the pidfile and drift file paths
Resolution
Red Hat Enterprise Linux are affected by these CVEs.
This issue is addressed in the following updates:
CVE | Bugzilla | Affected OS | Impact | Errata | Remarks |
---|---|---|---|---|---|
CVE-2015-7704 | Bug 1271070 | RHEL7,RHEL6 | Important | RHSA-2015-1930 | ntp-4.2.6p5-5.el6_7.2/ntp-4.2.6p5-19.el7_1.3 |
CVE-2015-7871 | Bug 1274265 | Not Affected | Important | - | - |
CVE-2015-7854 | Bug 1274263 | Not Affected | Moderate | - | - |
CVE-2015-7853 | Bug 1274262 | Not Affected | Moderate | - | - |
CVE-2015-7852 | Bug 1274261 | RHEL7,RHEL6,RHEL5 | Moderate | RHSA-2016:0780 | ntp-4.2.6p5-10.el6 |
CVE-2015-7851 | Bug 1274260 | Not Affected | Moderate | - | - |
CVE-2015-7849 | Bug 1274257 | Not Affected | Moderate | - | - |
CVE-2015-7848 | Bug 1274256 | Not Affected | Moderate | - | - |
CVE-2015-7701 | Bug 1274255 | RHEL7,RHEL6,RHEL5 | Moderate | RHSA-2016:0780 | ntp-4.2.6p5-10.el6 |
CVE-2015-7705 | Bug 1274184 | RHEL7,RHEL6,RHEL5 | Moderate | Will not fix | Mitigation |
CVE-2015-7691 | Bug 1274254 | RHEL7,RHEL6,RHEL5 | Moderate | RHSA-2016:0780 | ntp-4.2.6p5-10.el6 |
CVE-2015-7692 | Bug 1274254 | RHEL7,RHEL6,RHEL5 | Moderate | RHSA-2016:0780 | ntp-4.2.6p5-10.el6 |
CVE-2015-7702 | Bug 1274254 | RHEL7,RHEL6,RHEL5 | Moderate | RHSA-2016:0780 | ntp-4.2.6p5-10.el6 |
CVE-2015-7855 | Bug 1274264 | Not Affected | Low | - | - |
CVE-2015-7850 | Bug 1274258 | RHEL7,RHEL6,RHEL5 | Low | Will not fix | Limited |
CVE-2015-7703 | Bug 1254547 | RHEL6 | Low | RHSA-2016:0780 | ntp-4.2.6p5-10.el6 |
Mitigation
CVE-2015-7705 : Do not add the "limited" configuration option to any restrict lines in the ntp.conf file.
Limited
CVE-2015-7850 : The issue relies on the fact that an attacker could provide a crafted config file that could cause ntpd loop infinitely. Fixing this one case does not prevent the attacker from pointing ntpd to the e.g. /dev/zero file, which would have the same effect. This issue is limited to users who are able to use the :config command.
Root Cause
This solution is part of Red Hat’s fast-track publication program, providing a huge library of solutions that Red Hat engineers have created while supporting our customers. To give you the knowledge you need the instant it becomes available, these articles may be presented in a raw and unedited form.
Comments