ID

VAR-201504-0361


CVE

CVE-2015-1798


TITLE

NTP Project ntpd reference implementation contains multiple vulnerabilities

Trust: 0.8

sources: CERT/CC: VU#374268

DESCRIPTION

The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p2 requires a correct MAC only if the MAC field has a nonzero length, which makes it easier for man-in-the-middle attackers to spoof packets by omitting the MAC. NTP Project ntpd reference implementation accepts unauthenticated packets with symmetric key cryptography and does not protect symmetric associations against denial of service attacks. Supplementary information : CWE Vulnerability type by CWE-17: Code ( code ) Has been identified. http://cwe.mitre.org/data/definitions/17.htmlMan-in-the-middle attacks (man-in-the-middle attack) By MAC The packet may be spoofed by being deleted. Successful exploits may allow the attacker to cause a denial-of-service condition. NTP is prone to a security-bypass vulnerability. Successfully exploiting this issue may allow attackers to obtain sensitive information by conducting a man-in-the-middle attack. This may lead to other attacks. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201509-01 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: NTP: Multiple vulnerablities Date: September 24, 2015 Bugs: #545836, #553682 ID: 201509-01 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in NTP, the worst of which could lead to arbitrary code execution. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-misc/ntp < 4.2.8_p3 >= 4.2.8_p3 Description =========== Multiple vulnerabilities have been discovered in NTP. Please review the CVE identifiers referenced below for details. Impact ====== A remote attacker could possibly execute arbitrary code with the privileges of the process, or cause a Denial of Service condition. Workaround ========== There is no known workaround at this time. Resolution ========== All NTP users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/ntp-4.2.8_p3" References ========== [ 1 ] CVE-2015-1798 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1798 [ 2 ] CVE-2015-1799 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1799 [ 3 ] CVE-2015-5146 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5146 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201509-01 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2015 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/ntp-4.2.8p2-i486-1_slack14.1.txz: Upgraded. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1798 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1799 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/ntp-4.2.8p2-i486-1_slack13.0.txz Updated package for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/ntp-4.2.8p2-x86_64-1_slack13.0.txz Updated package for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/ntp-4.2.8p2-i486-1_slack13.1.txz Updated package for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/ntp-4.2.8p2-x86_64-1_slack13.1.txz Updated package for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/ntp-4.2.8p2-i486-1_slack13.37.txz Updated package for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/ntp-4.2.8p2-x86_64-1_slack13.37.txz Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/ntp-4.2.8p2-i486-1_slack14.0.txz Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/ntp-4.2.8p2-x86_64-1_slack14.0.txz Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/ntp-4.2.8p2-i486-1_slack14.1.txz Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/ntp-4.2.8p2-x86_64-1_slack14.1.txz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/ntp-4.2.8p2-i486-1.txz Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/ntp-4.2.8p2-x86_64-1.txz MD5 signatures: +-------------+ Slackware 13.0 package: 570bb3e4bb7b065101fa4963e757d7e7 ntp-4.2.8p2-i486-1_slack13.0.txz Slackware x86_64 13.0 package: e6add42a70a66496be2d4978370c2799 ntp-4.2.8p2-x86_64-1_slack13.0.txz Slackware 13.1 package: 99f1cfa5e23a256d840ed0a56b7f9400 ntp-4.2.8p2-i486-1_slack13.1.txz Slackware x86_64 13.1 package: 0a6622196521e084d36cda13fc6da824 ntp-4.2.8p2-x86_64-1_slack13.1.txz Slackware 13.37 package: 28cfe042c585cf036582ce5f0c2daadf ntp-4.2.8p2-i486-1_slack13.37.txz Slackware x86_64 13.37 package: c436da55cd2d113142410a9d982c5ac5 ntp-4.2.8p2-x86_64-1_slack13.37.txz Slackware 14.0 package: cf69f8ecb5e4c1902dfb22d0f9685278 ntp-4.2.8p2-i486-1_slack14.0.txz Slackware x86_64 14.0 package: 9c8344ec56d5d2335fd7370e2f9cf639 ntp-4.2.8p2-x86_64-1_slack14.0.txz Slackware 14.1 package: 9dcf0eafa851ad018f8341c2fb9307b5 ntp-4.2.8p2-i486-1_slack14.1.txz Slackware x86_64 14.1 package: e0c063f4e46a72ec86012a46299a46df ntp-4.2.8p2-x86_64-1_slack14.1.txz Slackware -current package: 5f72de16e3bb6cd216e7694a49671cee n/ntp-4.2.8p2-i486-1.txz Slackware x86_64 -current package: 1ba531770e4a2ae6e8e7116aaa26523e n/ntp-4.2.8p2-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg ntp-4.2.8p2-i486-1_slack14.1.txz Then, restart the NTP daemon: # sh /etc/rc.d/rc.ntpd restart +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. Release Date: 2015-05-19 Last Updated: 2015-05-19 Potential Security Impact: Remote Denial of Service (DoS), or other vulnerabilities Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP-UX running NTP. These could be exploited remotely to create a Denial of Service (DoS), or other vulnerabilities. References: CVE-2015-1798 - Symmetric-Key feature allows MAC address spoofing (CWE-17) CVE-2015-1799 - Symmetric-Key feature allows denial of service (CWE-17) SSRT102029 CERT-VU#852879 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.31 running NTP v4.x, specifically version C.4.2.6.5.0 or previous BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2015-1798 (AV:A/AC:H/Au:N/C:N/I:P/A:N) 1.8 CVE-2015-1799 (AV:A/AC:M/Au:N/C:N/I:P/A:P) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has provided the following solution for HP-UX B.11.31. A new B.11.31 depot for HP-UX-NTP_C.4.2.6.6.0 is available here: https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber =HPUX-NTP Reference: http://support.ntp.org/bin/view/Main/SecurityNotice MANUAL ACTIONS: Yes - Update PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa The following text is for use by the HP-UX Software Assistant. AFFECTED VERSIONS HP-UX B.11.31 ================== NTP.INETSVCS2-BOOT NTP.NTP-AUX NTP.NTP-RUN action: install revision C.4.2.6.6.0 or subsequent END AFFECTED VERSIONS HISTORY Version:1 (rev.1) - 19 May 2015 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. ============================================================================ Ubuntu Security Notice USN-2567-1 April 13, 2015 ntp vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.10 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS Summary: Several security issues were fixed in NTP. (CVE-2015-1798) Miroslav Lichvar discovered that NTP incorrectly handled certain invalid packets. This issue could either cause ntp-keygen to hang, or could result in non-random keys. (CVE number pending) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.10: ntp 1:4.2.6.p5+dfsg-3ubuntu2.14.10.3 Ubuntu 14.04 LTS: ntp 1:4.2.6.p5+dfsg-3ubuntu2.14.04.3 Ubuntu 12.04 LTS: ntp 1:4.2.6.p3+dfsg-1ubuntu3.4 In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: ntp security, bug fix, and enhancement update Advisory ID: RHSA-2015:2231-04 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2231.html Issue date: 2015-11-19 CVE Names: CVE-2014-9297 CVE-2014-9298 CVE-2014-9750 CVE-2014-9751 CVE-2015-1798 CVE-2015-1799 CVE-2015-3405 ===================================================================== 1. Summary: Updated ntp packages that fix multiple security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64 3. Description: The Network Time Protocol (NTP) is used to synchronize a computer's time with another referenced time source. These packages include the ntpd service which continuously adjusts system time and utilities used to query and configure the ntpd service. It was found that because NTP's access control was based on a source IP address, an attacker could bypass source IP restrictions and send malicious control and configuration packets by spoofing ::1 addresses. (CVE-2014-9298, CVE-2014-9751) A denial of service flaw was found in the way NTP hosts that were peering with each other authenticated themselves before updating their internal state variables. An attacker could send packets to one peer host, which could cascade to other peers, and stop the synchronization process among the reached peers. (CVE-2015-1799) A flaw was found in the way the ntp-keygen utility generated MD5 symmetric keys on big-endian systems. An attacker could possibly use this flaw to guess generated MD5 keys, which could then be used to spoof an NTP client or server. (CVE-2015-3405) A stack-based buffer overflow was found in the way the NTP autokey protocol was implemented. When an NTP client decrypted a secret received from an NTP server, it could cause that client to crash. A man-in-the-middle attacker could use this flaw to send crafted packets that would be accepted by a client or a peer without the attacker knowing the symmetric key. (CVE-2015-1798) The CVE-2015-1798 and CVE-2015-1799 issues were discovered by Miroslav Lichvár of Red Hat. Bug fixes: * The ntpd service truncated symmetric keys specified in the key file to 20 bytes. As a consequence, it was impossible to configure NTP authentication to work with peers that use longer keys. With this update, the maximum key length has been changed to 32 bytes. (BZ#1191111) * The ntpd service could previously join multicast groups only when starting, which caused problems if ntpd was started during system boot before network was configured. With this update, ntpd attempts to join multicast groups every time network configuration is changed. (BZ#1207014) * Previously, the ntp-keygen utility used the exponent of 3 when generating RSA keys. Consequently, generating RSA keys failed when FIPS mode was enabled. With this update, ntp-keygen has been modified to use the exponent of 65537, and generating keys in FIPS mode now works as expected. (BZ#1191116) * The ntpd service dropped incoming NTP packets if their source port was lower than 123 (the NTP port). With this update, ntpd no longer checks the source port number, and clients behind NAT are now able to correctly synchronize with the server. (BZ#1171640) Enhancements: * This update adds support for configurable Differentiated Services Code Points (DSCP) in NTP packets, simplifying configuration in large networks where different NTP implementations or versions are using different DSCP values. (BZ#1202828) * This update adds the ability to configure separate clock stepping thresholds for each direction (backward and forward). Use the "stepback" and "stepfwd" options to configure each threshold. (BZ#1193154) * Support for nanosecond resolution has been added to the Structural Health Monitoring (SHM) reference clock. Prior to this update, when a Precision Time Protocol (PTP) hardware clock was used as a time source to synchronize the system clock, the accuracy of the synchronization was limited due to the microsecond resolution of the SHM protocol. The nanosecond extension in the SHM protocol now allows sub-microsecond synchronization of the system clock. (BZ#1117702) All ntp users are advised to upgrade to these updated packages, which contain backported patches to correct these issues and add these enhancements. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1117702 - SHM refclock doesn't support nanosecond resolution 1122012 - SHM refclock allows only two units with owner-only access 1171640 - NTP drops requests when sourceport is below 123 1180721 - ntp: mreadvar command crash in ntpq 1184572 - CVE-2014-9298 CVE-2014-9751 ntp: drop packets with source address ::1 1184573 - CVE-2014-9297 CVE-2014-9750 ntp: vallen in extension fields are not validated 1191108 - ntpd should warn when monitoring facility can't be disabled due to restrict configuration 1191122 - ntpd -x steps clock on leap second 1193154 - permit differential fwd/back threshold for step vs. Package List: Red Hat Enterprise Linux Client (v. 7): Source: ntp-4.2.6p5-22.el7.src.rpm x86_64: ntp-4.2.6p5-22.el7.x86_64.rpm ntp-debuginfo-4.2.6p5-22.el7.x86_64.rpm ntpdate-4.2.6p5-22.el7.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): noarch: ntp-doc-4.2.6p5-22.el7.noarch.rpm ntp-perl-4.2.6p5-22.el7.noarch.rpm x86_64: ntp-debuginfo-4.2.6p5-22.el7.x86_64.rpm sntp-4.2.6p5-22.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: ntp-4.2.6p5-22.el7.src.rpm x86_64: ntp-4.2.6p5-22.el7.x86_64.rpm ntp-debuginfo-4.2.6p5-22.el7.x86_64.rpm ntpdate-4.2.6p5-22.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): noarch: ntp-doc-4.2.6p5-22.el7.noarch.rpm ntp-perl-4.2.6p5-22.el7.noarch.rpm x86_64: ntp-debuginfo-4.2.6p5-22.el7.x86_64.rpm sntp-4.2.6p5-22.el7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: ntp-4.2.6p5-22.el7.src.rpm aarch64: ntp-4.2.6p5-22.el7.aarch64.rpm ntp-debuginfo-4.2.6p5-22.el7.aarch64.rpm ntpdate-4.2.6p5-22.el7.aarch64.rpm ppc64: ntp-4.2.6p5-22.el7.ppc64.rpm ntp-debuginfo-4.2.6p5-22.el7.ppc64.rpm ntpdate-4.2.6p5-22.el7.ppc64.rpm ppc64le: ntp-4.2.6p5-22.el7.ppc64le.rpm ntp-debuginfo-4.2.6p5-22.el7.ppc64le.rpm ntpdate-4.2.6p5-22.el7.ppc64le.rpm s390x: ntp-4.2.6p5-22.el7.s390x.rpm ntp-debuginfo-4.2.6p5-22.el7.s390x.rpm ntpdate-4.2.6p5-22.el7.s390x.rpm x86_64: ntp-4.2.6p5-22.el7.x86_64.rpm ntp-debuginfo-4.2.6p5-22.el7.x86_64.rpm ntpdate-4.2.6p5-22.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): aarch64: ntp-debuginfo-4.2.6p5-22.el7.aarch64.rpm sntp-4.2.6p5-22.el7.aarch64.rpm noarch: ntp-doc-4.2.6p5-22.el7.noarch.rpm ntp-perl-4.2.6p5-22.el7.noarch.rpm ppc64: ntp-debuginfo-4.2.6p5-22.el7.ppc64.rpm sntp-4.2.6p5-22.el7.ppc64.rpm ppc64le: ntp-debuginfo-4.2.6p5-22.el7.ppc64le.rpm sntp-4.2.6p5-22.el7.ppc64le.rpm s390x: ntp-debuginfo-4.2.6p5-22.el7.s390x.rpm sntp-4.2.6p5-22.el7.s390x.rpm x86_64: ntp-debuginfo-4.2.6p5-22.el7.x86_64.rpm sntp-4.2.6p5-22.el7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: ntp-4.2.6p5-22.el7.src.rpm x86_64: ntp-4.2.6p5-22.el7.x86_64.rpm ntp-debuginfo-4.2.6p5-22.el7.x86_64.rpm ntpdate-4.2.6p5-22.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): noarch: ntp-doc-4.2.6p5-22.el7.noarch.rpm ntp-perl-4.2.6p5-22.el7.noarch.rpm x86_64: ntp-debuginfo-4.2.6p5-22.el7.x86_64.rpm sntp-4.2.6p5-22.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-9297 https://access.redhat.com/security/cve/CVE-2014-9298 https://access.redhat.com/security/cve/CVE-2014-9750 https://access.redhat.com/security/cve/CVE-2014-9751 https://access.redhat.com/security/cve/CVE-2015-1798 https://access.redhat.com/security/cve/CVE-2015-1799 https://access.redhat.com/security/cve/CVE-2015-3405 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD4DBQFWTkFJXlSAg2UNWIIRAphzAKCRHDVdHI5OvJ8glkXYLBwyQgeyvwCYmTV3 1hLTu5I/PUzWOnD8rRIlZQ== =sWdG -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce. Additionally, it was discovered that generating MD5 keys using ntp-keygen on big endian machines would either trigger an endless loop, or generate non-random keys. For the stable distribution (wheezy), these problems have been fixed in version 1:4.2.6.p5+dfsg-2+deb7u4. For the unstable distribution (sid), these problems have been fixed in version 1:4.2.6.p5+dfsg-7. We recommend that you upgrade your ntp packages

Trust: 3.51

sources: NVD: CVE-2015-1798 // CERT/CC: VU#374268 // JVNDB: JVNDB-2015-002115 // BID: 73950 // BID: 73951 // VULMON: CVE-2015-1798 // PACKETSTORM: 133699 // PACKETSTORM: 131582 // PACKETSTORM: 131941 // PACKETSTORM: 131405 // PACKETSTORM: 134448 // PACKETSTORM: 131396

AFFECTED PRODUCTS

vendor:ntpmodel:ntpscope:lteversion:4.2.7p444

Trust: 1.0

vendor:aristamodel: - scope: - version: -

Trust: 0.8

vendor:freebsdmodel: - scope: - version: -

Trust: 0.8

vendor:ntpmodel: - scope: - version: -

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.9.5

Trust: 0.8

vendor:necmodel:univergescope:eqversion:ip8800 series

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.10 to 10.10.3

Trust: 0.8

vendor:ntpmodel:ntpscope:ltversion:4.x

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.8.5

Trust: 0.8

vendor:ntpmodel:ntpscope:eqversion:4.2.8p2

Trust: 0.8

vendor:ibmmodel:security access manager for mobilescope:eqversion:8.0.1.3

Trust: 0.6

vendor:extremenetworksmodel:ids/ipsscope:eqversion:8.3.0.0

Trust: 0.6

vendor:freebsdmodel:freebsdscope:eqversion:7.3

Trust: 0.6

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.6

vendor:freebsdmodel:freebsdscope:eqversion:9.3

Trust: 0.6

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.6

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.6

vendor:ibmmodel:smartcloud entryscope:eqversion:2.3.0

Trust: 0.6

vendor:extremenetworksmodel:extremexosscope:eqversion:15.7

Trust: 0.6

vendor:extremenetworksmodel:purviewscope:neversion:6.3.0.182

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.10

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.10.3

Trust: 0.6

vendor:extremenetworksmodel:extremexosscope:neversion:15.6.4

Trust: 0.6

vendor:ibmmodel:smartcloud entry appliance fpscope:eqversion:3.1.0.4

Trust: 0.6

vendor:ibmmodel:smartcloud entry appliance fpscope:eqversion:2.4.0.3

Trust: 0.6

vendor:extremenetworksmodel:extremexosscope:eqversion:15.4.1.0

Trust: 0.6

vendor:ibmmodel:security access manager for mobilescope:eqversion:8.0.0.0

Trust: 0.6

vendor:slackwaremodel:linuxscope:eqversion:14.0

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.10.1

Trust: 0.6

vendor:extremenetworksmodel:extremexosscope:neversion:16.1.2

Trust: 0.6

vendor:freebsdmodel:freebsdscope:eqversion:10.0

Trust: 0.6

vendor:freebsdmodel:freebsdscope:eqversion:9.2

Trust: 0.6

vendor:extremenetworksmodel:ids/ipsscope:neversion:8.3.0.350

Trust: 0.6

vendor:ciscomodel:ios xr softwarescope:eqversion:0

Trust: 0.6

vendor:applemodel:mac osscope:neversion:x10.10.4

Trust: 0.6

vendor:extremenetworksmodel:extremexosscope:eqversion:21.1

Trust: 0.6

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.9.5

Trust: 0.6

vendor:ciscomodel:network convergence system series routersscope:eqversion:60005.0.1

Trust: 0.6

vendor:extremenetworksmodel:extremexosscope:eqversion:16.2

Trust: 0.6

vendor:ciscomodel:unified computing system central softwarescope:eqversion:1.0

Trust: 0.6

vendor:slackwaremodel:linuxscope:eqversion:13.1

Trust: 0.6

vendor:ciscomodel:network convergence system series routersscope:eqversion:60005.0

Trust: 0.6

vendor:freebsdmodel:freebsdscope:eqversion:8.3

Trust: 0.6

vendor:extremenetworksmodel:nacscope:neversion:6.3.0.182

Trust: 0.6

vendor:rockwellmodel:automation stratixscope:neversion:590015.6.3

Trust: 0.6

vendor:freebsdmodel:freebsdscope:eqversion:8.0

Trust: 0.6

vendor:meinbergmodel:network time protocolscope:eqversion:4.2.6

Trust: 0.6

vendor:slackwaremodel:linuxscope:eqversion:13.0

Trust: 0.6

vendor:extremenetworksmodel:netsightscope:eqversion:6.3.0.0

Trust: 0.6

vendor:extremenetworksmodel:identifi wirelessscope:eqversion:10.11

Trust: 0.6

vendor:meinbergmodel:network time protocolscope:eqversion:4.2.7

Trust: 0.6

vendor:ibmmodel:security network protectionscope:eqversion:5.3

Trust: 0.6

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.6

vendor:meinbergmodel:network time protocolscope:eqversion:4.2.8

Trust: 0.6

vendor:extremenetworksmodel:extremexosscope:neversion:21.1.1

Trust: 0.6

vendor:freebsdmodel:freebsdscope:eqversion:7.4

Trust: 0.6

vendor:oraclemodel:enterprise linuxscope:eqversion:7

Trust: 0.6

vendor:ubuntumodel:linux ltsscope:eqversion:14.04

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.8.5

Trust: 0.6

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.6

vendor:freebsdmodel:freebsdscope:eqversion:9.0

Trust: 0.6

vendor:rockwellmodel:automation stratixscope:eqversion:59000

Trust: 0.6

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.6

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.6

vendor:extremenetworksmodel:purviewscope:eqversion:6.3.0.0

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.10.2

Trust: 0.6

vendor:ibmmodel:security access manager for mobilescope:eqversion:8.0.1.2

Trust: 0.6

vendor:ibmmodel:smartcloud entry appliance fpscope:eqversion:2.3.0.3

Trust: 0.6

vendor:extremenetworksmodel:extremexosscope:neversion:16.2.1

Trust: 0.6

vendor:ibmmodel:smartcloud entryscope:eqversion:2.4.0

Trust: 0.6

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.6

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.6

vendor:slackwaremodel:linuxscope:eqversion:13.37

Trust: 0.6

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.6

vendor:ubuntumodel:linuxscope:eqversion:14.10

Trust: 0.6

vendor:ibmmodel:security access manager for mobilescope:eqversion:8.0.1.1

Trust: 0.6

vendor:ibmmodel:smartcloud entryscope:eqversion:3.2

Trust: 0.6

vendor:extremenetworksmodel:summit wm3000 seriesscope:eqversion:0

Trust: 0.6

vendor:oraclemodel:linuxscope:eqversion:0

Trust: 0.6

vendor:ibmmodel:smartcloud entryscope:eqversion:2.2

Trust: 0.6

vendor:slackwaremodel:linuxscope:eqversion:14.1

Trust: 0.6

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.6

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.6

vendor:ibmmodel:smartcloud entry appliance fpscope:eqversion:3.2.0.4

Trust: 0.6

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.6

vendor:ibmmodel:smartcloud provisioning for software virtual appliancescope:eqversion:2.1

Trust: 0.6

vendor:freebsdmodel:freebsdscope:eqversion:8.2

Trust: 0.6

vendor:extremenetworksmodel:nacscope:eqversion:6.3.0.0

Trust: 0.6

vendor:freebsdmodel:freebsdscope:eqversion:8.1

Trust: 0.6

vendor:ibmmodel:smartcloud entryscope:eqversion:3.1

Trust: 0.6

vendor:freebsdmodel:freebsdscope:eqversion:8.4

Trust: 0.6

vendor:extremenetworksmodel:identifi wirelessscope:neversion:10.11.1

Trust: 0.6

vendor:extremenetworksmodel:extremexosscope:neversion:15.7.2

Trust: 0.6

vendor:freebsdmodel:freebsdscope:eqversion:9.1

Trust: 0.6

vendor:ibmmodel:smartcloud entry appliance fpscope:eqversion:2.2.0.3

Trust: 0.6

vendor:ibmmodel:security network protectionscope:eqversion:5.2.0

Trust: 0.6

vendor:ciscomodel:unified computing system central softwarescope:eqversion:1.1

Trust: 0.6

vendor:extremenetworksmodel:netsightscope:neversion:6.3.0.182

Trust: 0.6

vendor:freebsdmodel:freebsdscope:eqversion:10.1

Trust: 0.6

vendor:ibmmodel:flex system managerscope:eqversion:1.2.1.0

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.3.4

Trust: 0.3

vendor:ibmmodel:smart analytics systemscope:eqversion:56003

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.1.1.16

Trust: 0.3

vendor:ibmmodel:puredata system for operational analyticsscope:eqversion:1.1

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.0.13

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.3.50

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.1.4.1

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1.7.16

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.1.8

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.3.2

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.16

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1.2

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.1.4

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1.8

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.2.0.0

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.0.10

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.1.2.6

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.1.3.5

Trust: 0.3

vendor:ibmmodel:smart analytics systemscope:eqversion:56002

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1.7

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.1.1.5

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.3.3

Trust: 0.3

vendor:ibmmodel:smart analytics systemscope:eqversion:76000

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1.75

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1.3

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.4.0

Trust: 0.3

vendor:ibmmodel:puredata system for operational analyticsscope:eqversion:1.0

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1.5

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.3

Trust: 0.3

vendor:ibmmodel:smart analytics systemscope:eqversion:56001

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1.9.5

Trust: 0.3

vendor:ibmmodel:security access managerscope:eqversion:9.0

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.1.0

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1.8.15

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.1.2

Trust: 0.3

vendor:ibmmodel:smart analytics systemscope:eqversion:77100

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1.4

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.1.0.0

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.2.4

Trust: 0.3

vendor:ibmmodel:smart analytics systemscope:eqversion:77000

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1.68

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.2.0

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.0.12

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.2.5

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.1.1

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.1.1

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1.9.6

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.3.0

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.1.3

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.2.6

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.14

Trust: 0.3

vendor:meinbergmodel:ntpscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.0.0

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.1.2.15

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.3.0

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.1.0

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1.8.7

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1.1

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.1.3

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1.6

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1.8.6

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.0.11

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.20

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.0.1

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1.9

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.1.9

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.4.0

Trust: 0.3

vendor:meinbergmodel:network time protocol 4.2.7p10scope: - version: -

Trust: 0.3

vendor:meinbergmodel:network time protocol 4.2.5p99scope: - version: -

Trust: 0.3

vendor:meinbergmodel:network time protocol 4.2.7p11scope: - version: -

Trust: 0.3

vendor:meinbergmodel:network time protocol 4.2.6p2scope: - version: -

Trust: 0.3

vendor:meinbergmodel:network time protocol 4.2.6p3scope: - version: -

Trust: 0.3

vendor:meinbergmodel:network time protocol 4.2.8p1scope: - version: -

Trust: 0.3

vendor:ibmmodel:security access manager for mobilescope:eqversion:9.0

Trust: 0.3

vendor:meinbergmodel:network time protocol 4.2.6p5scope: - version: -

Trust: 0.3

vendor:meinbergmodel:network time protocol 4.2.6p1scope: - version: -

Trust: 0.3

vendor:meinbergmodel:network time protocol 4.2.7p230scope: - version: -

Trust: 0.3

sources: CERT/CC: VU#374268 // BID: 73950 // BID: 73951 // JVNDB: JVNDB-2015-002115 // NVD: CVE-2015-1798

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-1798
value: LOW

Trust: 1.0

NVD: CVE-2015-1798
value: LOW

Trust: 0.8

VULMON: CVE-2015-1798
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2015-1798
severity: LOW
baseScore: 1.8
vectorString: AV:A/AC:H/AU:N/C:N/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.2
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

sources: VULMON: CVE-2015-1798 // JVNDB: JVNDB-2015-002115 // NVD: CVE-2015-1798

PROBLEMTYPE DATA

problemtype:CWE-17

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2015-002115 // NVD: CVE-2015-1798

THREAT TYPE

network

Trust: 0.6

sources: BID: 73950 // BID: 73951

TYPE

Unknown

Trust: 0.3

sources: BID: 73950

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-002115

PATCH

title:APPLE-SA-2015-06-30-2 OS X Yosemite v10.10.4 and Security Update 2015-005url:http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html

Trust: 0.8

title:HT204942url:https://support.apple.com/en-us/HT204942

Trust: 0.8

title:HT204942url:https://support.apple.com/ja-jp/HT204942

Trust: 0.8

title:cisco-sa-20150408-ntpdurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-ntpd

Trust: 0.8

title:NV17-008url:http://jpn.nec.com/security-info/secinfo/nv17-008.html

Trust: 0.8

title:Bug 2779url:http://bugs.ntp.org/show_bug.cgi?id=2779

Trust: 0.8

title:Oracle Solaris Third Party Bulletin - April 2015url:http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html

Trust: 0.8

title:Recent Vulnerabilitiesurl:http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities

Trust: 0.8

title:38276url:http://tools.cisco.com/security/center/viewAlert.x?alertId=38276

Trust: 0.8

title:cisco-sa-20150408-ntpdurl:http://www.cisco.com/cisco/web/support/JP/112/1128/1128965_cisco-sa-20150408-ntpd-j.html

Trust: 0.8

title:Red Hat: Moderate: ntp security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20152231 - Security Advisory

Trust: 0.1

title:Debian CVElist Bug Report Logs: ntp: CVE-2015-1798 CVE-2015-1799url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=d133e5923f2516253cdb12d9d3c37c05

Trust: 0.1

title:Ubuntu Security Notice: ntp vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2567-1

Trust: 0.1

title:Red Hat: CVE-2015-1798url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2015-1798

Trust: 0.1

title:Debian Security Advisories: DSA-3223-1 ntp -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=d552cdc6350071420c8916bcaed96264

Trust: 0.1

title:Amazon Linux AMI: ALAS-2015-520url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2015-520

Trust: 0.1

title:Cisco: Multiple Vulnerabilities in ntpd (April 2015) Affecting Cisco Productsurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20150408-ntpd

Trust: 0.1

title:Apple: OS X Yosemite v10.10.4 and Security Update 2015-005url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=50398602701d671602946005c7864211

Trust: 0.1

title:Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - April 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=2a43c5799a7dd07d6c0a92a3b040d12f

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - October 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=435ed9abc2fb1e74ce2a69605a01e326

Trust: 0.1

title:The Registerurl:https://www.theregister.co.uk/2015/04/09/ntp_vulns/

Trust: 0.1

title:The Registerurl:https://www.theregister.co.uk/2015/04/09/cisco_security_software_needs_security_patch/

Trust: 0.1

title:Threatposturl:https://threatpost.com/two-ntp-key-authentication-vulnerabilities-patched/112067/

Trust: 0.1

sources: VULMON: CVE-2015-1798 // JVNDB: JVNDB-2015-002115

EXTERNAL IDS

db:CERT/CCid:VU#374268

Trust: 3.3

db:NVDid:CVE-2015-1798

Trust: 3.1

db:BIDid:73951

Trust: 1.4

db:SECTRACKid:1032032

Trust: 1.1

db:MCAFEEid:SB10114

Trust: 1.1

db:JVNid:JVNVU95993136

Trust: 0.8

db:JVNDBid:JVNDB-2015-002115

Trust: 0.8

db:ICS CERTid:ICSA-17-094-04

Trust: 0.7

db:BIDid:73950

Trust: 0.3

db:VULMONid:CVE-2015-1798

Trust: 0.1

db:PACKETSTORMid:133699

Trust: 0.1

db:PACKETSTORMid:131582

Trust: 0.1

db:PACKETSTORMid:131941

Trust: 0.1

db:PACKETSTORMid:131405

Trust: 0.1

db:PACKETSTORMid:134448

Trust: 0.1

db:PACKETSTORMid:131396

Trust: 0.1

sources: CERT/CC: VU#374268 // VULMON: CVE-2015-1798 // BID: 73950 // BID: 73951 // PACKETSTORM: 133699 // PACKETSTORM: 131582 // PACKETSTORM: 131941 // PACKETSTORM: 131405 // PACKETSTORM: 134448 // PACKETSTORM: 131396 // JVNDB: JVNDB-2015-002115 // NVD: CVE-2015-1798

REFERENCES

url:http://www.kb.cert.org/vuls/id/374268

Trust: 2.5

url:http://support.ntp.org/bin/view/main/securitynotice#recent_vulnerabilities

Trust: 1.9

url:http://bugs.ntp.org/show_bug.cgi?id=2779

Trust: 1.9

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150408-ntpd

Trust: 1.7

url:http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html

Trust: 1.7

url:http://tools.cisco.com/security/center/viewalert.x?alertid=38276

Trust: 1.5

url:http://www.ubuntu.com/usn/usn-2567-1

Trust: 1.2

url:https://security.gentoo.org/glsa/201509-01

Trust: 1.2

url:http://www.securitytracker.com/id/1032032

Trust: 1.1

url:http://www.mandriva.com/security/advisories?name=mdvsa-2015:202

Trust: 1.1

url:http://www.securityfocus.com/bid/73951

Trust: 1.1

url:http://www.debian.org/security/2015/dsa-3223

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-april/155863.html

Trust: 1.1

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10114

Trust: 1.1

url:http://lists.opensuse.org/opensuse-updates/2015-04/msg00052.html

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-april/155864.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2015/jun/msg00002.html

Trust: 1.1

url:http://support.apple.com/kb/ht204942

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=143213867103400&w=2

Trust: 1.1

url:http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2015-1459.html

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1798

Trust: 0.9

url:http://bugs.ntp.org/show_bug.cgi?id=2781

Trust: 0.8

url:http://www.ntp.org/downloads.html

Trust: 0.8

url:https://www.freebsd.org/security/advisories/freebsd-sa-15:07.ntp.asc

Trust: 0.8

url:http://support.ntp.org/bin/view/main/securitynoticehttp://www.ntp.org/downloads.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu95993136/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-1798

Trust: 0.8

url:https://ics-cert.us-cert.gov/advisories/icsa-17-094-04

Trust: 0.7

url:http://www.ntp.org

Trust: 0.6

url:http://seclists.org/bugtraq/2015/apr/156

Trust: 0.6

url:https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04679309

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1022814

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21966578

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21975967

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg2c1000111

Trust: 0.6

url:https://gtacknowledge.extremenetworks.com/articles/vulnerability_notice/vn-2015-006-symmetric-key-ntp/?q=cve-2015-1798&l=en_us&fs=search&pn=1

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2015-1799

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2015-1798

Trust: 0.6

url:http://aix.software.ibm.com/aix/efixes/security/ntp_advisory3.asc

Trust: 0.3

url:https://bugzilla.redhat.com/show_bug.cgi?id=cve-2015-1799

Trust: 0.3

url:http://tools.cisco.com/security/center/viewalert.x?alertid=38275

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1022831

Trust: 0.3

url:http://aix.software.ibm.com/aix/efixes/security/ntp4_advisory.asc

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21966675

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21967791

Trust: 0.3

url:https://bugzilla.redhat.com/show_bug.cgi?id=cve-2015-1798

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2015-1798

Trust: 0.2

url:http://www.debian.org/security/

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/17.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/two-ntp-key-authentication-vulnerabilities-patched/112067/

Trust: 0.1

url:https://usn.ubuntu.com/2567-1/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1798

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1799

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5146

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5146

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://slackware.com

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1799

Trust: 0.1

url:http://osuosl.org)

Trust: 0.1

url:http://slackware.com/gpg-key

Trust: 0.1

url:http://support.ntp.org/bin/view/main/securitynotice

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.1

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.1

url:https://h20392.www2.hp.com/portal/swdepot/displayproductinfo.do?productnumber

Trust: 0.1

url:https://www.hp.com/go/swa

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/ntp/1:4.2.6.p5+dfsg-3ubuntu2.14.10.3

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/ntp/1:4.2.6.p3+dfsg-1ubuntu3.4

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/ntp/1:4.2.6.p5+dfsg-3ubuntu2.14.04.3

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2014-9297

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3405

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2014-9750

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-9751

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-9297

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2015-2231.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-1799

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2014-9298

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2014-9751

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-9750

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3405

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-9298

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

sources: CERT/CC: VU#374268 // VULMON: CVE-2015-1798 // BID: 73950 // BID: 73951 // PACKETSTORM: 133699 // PACKETSTORM: 131582 // PACKETSTORM: 131941 // PACKETSTORM: 131405 // PACKETSTORM: 134448 // PACKETSTORM: 131396 // JVNDB: JVNDB-2015-002115 // NVD: CVE-2015-1798

CREDITS

Miroslav Lichv&amp;amp;amp;amp;amp;aacute;r of Red Hat

Trust: 0.3

sources: BID: 73950

SOURCES

db:CERT/CCid:VU#374268
db:VULMONid:CVE-2015-1798
db:BIDid:73950
db:BIDid:73951
db:PACKETSTORMid:133699
db:PACKETSTORMid:131582
db:PACKETSTORMid:131941
db:PACKETSTORMid:131405
db:PACKETSTORMid:134448
db:PACKETSTORMid:131396
db:JVNDBid:JVNDB-2015-002115
db:NVDid:CVE-2015-1798

LAST UPDATE DATE

2025-06-29T22:08:45.871000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#374268date:2015-04-10T00:00:00
db:VULMONid:CVE-2015-1798date:2018-01-05T00:00:00
db:BIDid:73950date:2017-05-23T16:24:00
db:BIDid:73951date:2017-05-23T16:24:00
db:JVNDBid:JVNDB-2015-002115date:2017-03-09T00:00:00
db:NVDid:CVE-2015-1798date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CERT/CCid:VU#374268date:2015-04-07T00:00:00
db:VULMONid:CVE-2015-1798date:2015-04-08T00:00:00
db:BIDid:73950date:2015-04-07T00:00:00
db:BIDid:73951date:2015-04-07T00:00:00
db:PACKETSTORMid:133699date:2015-09-25T06:54:41
db:PACKETSTORMid:131582date:2015-04-22T20:14:29
db:PACKETSTORMid:131941date:2015-05-20T23:06:21
db:PACKETSTORMid:131405date:2015-04-14T18:53:39
db:PACKETSTORMid:134448date:2015-11-20T00:42:01
db:PACKETSTORMid:131396date:2015-04-13T14:05:55
db:JVNDBid:JVNDB-2015-002115date:2015-04-09T00:00:00
db:NVDid:CVE-2015-1798date:2015-04-08T10:59:04.610