Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.120060
Kategorie:Amazon Linux Local Security Checks
Titel:Amazon Linux: Security Advisory (ALAS-2015-520)
Zusammenfassung:The remote host is missing an update for the 'ntp' package(s) announced via the ALAS-2015-520 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'ntp' package(s) announced via the ALAS-2015-520 advisory.

Vulnerability Insight:
The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p2 requires a correct MAC only if the MAC field has a nonzero length, which makes it easier for man-in-the-middle attackers to spoof packets by omitting the MAC. (CVE-2015-1798)

The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer. (CVE-2015-1799)

This update also addresses leap-second handling. With older ntp versions, the -x option was sometimes used as a workaround to avoid kernel inserting/deleting leap seconds by stepping the clock and possibly upsetting running applications. That no longer works with 4.2.6 as ntpd steps the clock itself when a leap second occurs. The fix is to treat the one second offset gained during leap second as a normal offset and check the stepping threshold (set by -x or tinker step) to decide if a step should be applied. See this forum post for more information on the Amazon Linux AMI's leap-second handling.

Affected Software/OS:
'ntp' package(s) on Amazon Linux.

Solution:
Please install the updated package(s).

CVSS Score:
4.3

CVSS Vector:
AV:A/AC:M/Au:N/C:N/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2015-1798
1032032
http://www.securitytracker.com/id/1032032
20150408 Multiple Vulnerabilities in ntpd (April 2015) Affecting Cisco Products
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-ntpd
20150408 Network Time Protocol Daemon MAC Checking Failure Authentication Bypass Vulnerability
http://tools.cisco.com/security/center/viewAlert.x?alertId=38276
73951
http://www.securityfocus.com/bid/73951
APPLE-SA-2015-06-30-2
http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
DSA-3223
http://www.debian.org/security/2015/dsa-3223
FEDORA-2015-5761
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155864.html
FEDORA-2015-5874
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155863.html
GLSA-201509-01
https://security.gentoo.org/glsa/201509-01
HPSBUX03333
http://marc.info/?l=bugtraq&m=143213867103400&w=2
MDVSA-2015:202
http://www.mandriva.com/security/advisories?name=MDVSA-2015:202
RHSA-2015:1459
http://rhn.redhat.com/errata/RHSA-2015-1459.html
SSRT102029
USN-2567-1
http://www.ubuntu.com/usn/USN-2567-1
VU#374268
http://www.kb.cert.org/vuls/id/374268
http://bugs.ntp.org/show_bug.cgi?id=2779
http://support.apple.com/kb/HT204942
http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
https://kc.mcafee.com/corporate/index?page=content&id=SB10114
openSUSE-SU-2015:0775
http://lists.opensuse.org/opensuse-updates/2015-04/msg00052.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-1799
1032031
http://www.securitytracker.com/id/1032031
20150408 Network Time Protocol Daemon Symmetric Mode Packet Processing Denial of Service Vulnerability
http://tools.cisco.com/security/center/viewAlert.x?alertId=38275
73950
http://www.securityfocus.com/bid/73950
DSA-3222
http://www.debian.org/security/2015/dsa-3222
HPSBHF03557
http://marc.info/?l=bugtraq&m=145750740530849&w=2
[chrony-announce] 20150407 chrony-1.31.1 released (security)
http://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2015/04/msg00002.html
http://bugs.ntp.org/show_bug.cgi?id=2781
CopyrightCopyright (C) 2015 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.