Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2018:1765-2

Опубликовано: 18 окт. 2018
Источник: suse-cvrf

Описание

Security update for ntp

This update for ntp fixes the following issues:

  • Update to 4.2.8p11 (bsc#1082210):
    • CVE-2016-1549: Sybil vulnerability: ephemeral association attack. While fixed in ntp-4.2.8p7, there are significant additional protections for this issue in 4.2.8p11.
    • CVE-2018-7182: ctl_getitem(): buffer read overrun leads to undefined behavior and information leak. (bsc#1083426)
    • CVE-2018-7170: Multiple authenticated ephemeral associations. (bsc#1083424)
    • CVE-2018-7184: Interleaved symmetric mode cannot recover from bad state. (bsc#1083422)
    • CVE-2018-7185: Unauthenticated packet can reset authenticated interleaved association. (bsc#1083420)
    • CVE-2018-7183: ntpq:decodearr() can write beyond its buffer limit.(bsc#1083417)
  • Don't use libevent's cached time stamps in sntp. (bsc#1077445)

This update is a reissue of the previous update with LTSS channels included.

Список пакетов

SUSE Linux Enterprise Server 12 SP2-BCL
ntp-4.2.8p11-64.5.1
ntp-doc-4.2.8p11-64.5.1

Описание

A malicious authenticated peer can create arbitrarily-many ephemeral associations in order to win the clock selection algorithm in ntpd in NTP 4.2.8p4 and earlier and NTPsec 3e160db8dc248a0bcb053b56a80167dc742d2b74 and a5fb34b9cc89b92a8fef2f459004865c93bb7f92 and modify a victim's clock.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:ntp-4.2.8p11-64.5.1
SUSE Linux Enterprise Server 12 SP2-BCL:ntp-doc-4.2.8p11-64.5.1

Ссылки

Описание

ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sybil attack. This issue exists because of an incomplete fix for CVE-2016-1549.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:ntp-4.2.8p11-64.5.1
SUSE Linux Enterprise Server 12 SP2-BCL:ntp-doc-4.2.8p11-64.5.1

Ссылки

Описание

The ctl_getitem method in ntpd in ntp-4.2.8p6 before 4.2.8p11 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mode 6 packet with a ntpd instance from 4.2.8p6 through 4.2.8p10.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:ntp-4.2.8p11-64.5.1
SUSE Linux Enterprise Server 12 SP2-BCL:ntp-doc-4.2.8p11-64.5.1

Ссылки

Описание

Buffer overflow in the decodearr function in ntpq in ntp 4.2.8p6 through 4.2.8p10 allows remote attackers to execute arbitrary code by leveraging an ntpq query and sending a response with a crafted array.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:ntp-4.2.8p11-64.5.1
SUSE Linux Enterprise Server 12 SP2-BCL:ntp-doc-4.2.8p11-64.5.1

Ссылки

Описание

ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:ntp-4.2.8p11-64.5.1
SUSE Linux Enterprise Server 12 SP2-BCL:ntp-doc-4.2.8p11-64.5.1

Ссылки

Описание

The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:ntp-4.2.8p11-64.5.1
SUSE Linux Enterprise Server 12 SP2-BCL:ntp-doc-4.2.8p11-64.5.1

Ссылки