Описание
The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets.
A missing return statement in the receive() function could potentially allow a remote attacker to bypass NTP's authentication mechanism.
Отчет
This issue did not affect the versions of ntpd as shipped with Red Hat Enterprise Linux 4 and 5. It has been addressed in Red Hat Enterprise Linux 6 and 7 via RHSA-2014:2024.
Меры по смягчению последствий
Remove or comment out all configuration directives beginning with the crypto keyword in your ntp.conf file.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | ntp | Not affected | ||
Red Hat Enterprise Linux 6 | ntp | Fixed | RHSA-2014:2024 | 20.12.2014 |
Red Hat Enterprise Linux 6.5 Extended Update Support | ntp | Fixed | RHSA-2015:0104 | 28.01.2015 |
Red Hat Enterprise Linux 7 | ntp | Fixed | RHSA-2014:2024 | 20.12.2014 |
Показывать по
Дополнительная информация
Статус:
EPSS
5 Medium
CVSS2
Связанные уязвимости
The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets.
The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets.
The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 contin ...
The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets.
Уязвимость микропрограммного обеспечения системы коммуникаций Cisco Unified Communications Manager, позволяющая удаленному злоумышленнику получить несанкционированный доступ к устройству
EPSS
5 Medium
CVSS2