CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

CVE-2015-7973 Ubuntu Security Notification for Ntp Vulnerabilities (USN-3096-1)

2016年10月10日 1957点热度 0人点赞 0条评论

漏洞类别:Ubuntu

漏洞等级:

漏洞信息

It was discovered that NTP incorrectly handled authenticated broadcast mode.

It was discovered that NTP incorrectly verified peer associations of symmetric keys.

It was discovered that the NTP ntpq utility incorrectly handled memory.

It was discovered that the NTP ntpq utility incorrectly handled dangerous characters in filenames.

It was discovered that NTP incorrectly handled large restrict lists.

It was discovered that NTP incorrectly handled authenticated broadcast mode.

It was discovered that NTP incorrectly handled origin timestamp checks.

It was discovered that the NTP ntpq utility did not properly handle certain incorrect values.

It was discovered that the NTP cronjob incorrectly cleaned up the statistics directory.

It was discovered that NTP incorrectly validated crypto-NAKs.

It was discovered that NTP incorrectly handled switching to interleaved symmetric mode.

It was discovered that NTP incorrectly handled message authentication.

It was discovered that NTP incorrectly handled duplicate IPs on unconfig directives.

It was discovered that NTP incorrectly handled certail peer associations.

It was discovered that NTP incorrectly handled certain spoofed packets.

It was discovered that NTP incorrectly handled certain packets when autokey is enabled.

It was discovered that NTP incorrectly handled certain spoofed broadcast packets.

In the default installation, attackers would be isolated by the NTP AppArmor profile.

漏洞危害

A remote attacker could use this issue to perform a replay attack. (CVE-2015-7973)

A remote attacker could use this issue to perform an impersonation attack. (CVE-2015-7974)

An attacker could possibly use this issue to cause ntpq to crash, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS. (CVE-2015-7975)

An attacker could possibly use this issue to overwrite arbitrary files. (CVE-2015-7976)

An attacker could use this issue to cause NTP to crash, resulting in a denial of service. (CVE-2015-7977, CVE-2015-7978)

A remote attacker could use this issue to cause NTP to crash, resulting in a denial of service. (CVE-2015-7979)

(CVE-2015-8138)

An attacker could possibly use this issue to cause ntpq to hang, resulting in a denial of service. (CVE-2015-8158)

A local attacker could possibly use this to escalate privileges. (CVE-2016-0727)

A remote attacker could possibly use this issue to prevent clients from synchronizing. (CVE-2016-1547)

A remote attacker could possibly use this issue to prevent clients from synchronizing. (CVE-2016-1548)

A remote attacker could possibly use this issue to recover the message digest key. (CVE-2016-1550)

An authenticated remote attacker could possibly use this issue to cause NTP to crash, resulting in a denial of service. (CVE-2016-2516)

A remote attacker could possibly use this issue to cause NTP to crash, resulting in a denial of service. (CVE-2016-2518)

A remote attacker could possibly use this issue to cause a denial of service. (CVE-2016-4954)

A remote attacker could possibly use this issue to cause a denial of service. (CVE-2016-4955)

A remote attacker could possibly use this issue to cause a denial of service. (CVE-2016-4956)

解决方案

Refer to Ubuntu advisory USN-3096-1 for affected packages and patching details, or update with your package manager.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

USN-3096-1: 12.04 (Precise) on src (ntp)

USN-3096-1: 16.04 (Xenial) on src (ntp)

USN-3096-1: 14.04 (Kylin) on src (ntp)

0day

标签: 暂无
最后更新:2016年10月22日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me