Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-9294

Опубликовано: 19 дек. 2014
Источник: redhat
CVSS2: 4

Описание

util/ntp-keygen.c in ntp-keygen in NTP before 4.2.7p230 uses a weak RNG seed, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.

It was found that ntp-keygen used a weak method for generating MD5 keys. This could possibly allow an attacker to guess generated MD5 keys that could then be used to spoof an NTP client or server. Note: it is recommended to regenerate any MD5 keys that had explicitly been generated with ntp-keygen; the default installation does not contain such keys.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4ntpAffected
Red Hat Enterprise Linux 5ntpFixedRHSA-2014:202520.12.2014
Red Hat Enterprise Linux 6ntpFixedRHSA-2014:202420.12.2014
Red Hat Enterprise Linux 6.5 Extended Update SupportntpFixedRHSA-2015:010428.01.2015
Red Hat Enterprise Linux 7ntpFixedRHSA-2014:202420.12.2014

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-335
Дефект:
CWE-338
https://bugzilla.redhat.com/show_bug.cgi?id=1176035ntp: ntp-keygen uses weak random number generator and seed when generating MD5 keys

4 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

util/ntp-keygen.c in ntp-keygen in NTP before 4.2.7p230 uses a weak RNG seed, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.

nvd
больше 10 лет назад

util/ntp-keygen.c in ntp-keygen in NTP before 4.2.7p230 uses a weak RNG seed, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.

debian
больше 10 лет назад

util/ntp-keygen.c in ntp-keygen in NTP before 4.2.7p230 uses a weak RN ...

github
больше 3 лет назад

util/ntp-keygen.c in ntp-keygen in NTP before 4.2.7p230 uses a weak RNG seed, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.

fstec
больше 10 лет назад

Уязвимость микропрограммного обеспечения системы коммуникаций Cisco Unified Communications Manager, позволяющая удаленному злоумышленнику обойти механизм защиты устройства

4 Medium

CVSS2