The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of NTP.org: two vulnerabilities of Crypto

Synthesis of the vulnerability 

An attacker can use two vulnerabilities related to cryptographic features of NTP.org.
Vulnerable products: Cisco ASR, Cisco ACE, ASA, Cisco Catalyst, IOS by Cisco, IOS XE Cisco, IOS XR Cisco, Cisco IPS, Nexus by Cisco, NX-OS, Prime Infrastructure, Cisco PRSM, Cisco Router, Secure ACS, Debian, Black Diamond, ExtremeXOS, Summit, BIG-IP Hardware, TMOS, Fedora, FreeBSD, HP Switch, HP-UX, AIX, Meinberg NTP Server, NTP.org, openSUSE, Solaris, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity of this weakness: 2/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 07/04/2015.
Références of this bulletin: 2779, 2781, bulletinapr2015, c04679309, c05033748, cisco-sa-20150408-ntpd, CVE-2015-1798, CVE-2015-1799, DSA-3223-1, FEDORA-2015-5830, FEDORA-2015-5874, FreeBSD-SA-15:07.ntp, HPSBHF03557, HPSBUX03333, MDVSA-2015:202, ntp4_advisory, ntp_advisory3, openSUSE-SU-2015:0775-1, RHSA-2015:1459-01, RHSA-2015:2231-04, SOL16505, SOL16506, SSA:2015-111-08, SSRT102029, SUSE-SU-2015:1173-1, SUSE-SU-2016:1912-1, SUSE-SU-2016:2094-1, USN-2567-1, VIGILANCE-VUL-16548, VN-2015-006-NTP, VU#374268.

Description of the vulnerability 

Several vulnerabilities were announced in NTP.org.

An attacker can use a message without MAC (Message Authentication Code), in order to bypass the authentication using a symmetric key. [severity:2/4; 2779, CVE-2015-1798]

An attacker can spoof a packet between two servers paired with a symmetric association, in order to trigger a denial of service. [severity:2/4; 2781, CVE-2015-1799]
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This vulnerability bulletin impacts software or systems such as Cisco ASR, Cisco ACE, ASA, Cisco Catalyst, IOS by Cisco, IOS XE Cisco, IOS XR Cisco, Cisco IPS, Nexus by Cisco, NX-OS, Prime Infrastructure, Cisco PRSM, Cisco Router, Secure ACS, Debian, Black Diamond, ExtremeXOS, Summit, BIG-IP Hardware, TMOS, Fedora, FreeBSD, HP Switch, HP-UX, AIX, Meinberg NTP Server, NTP.org, openSUSE, Solaris, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.

Our Vigil@nce team determined that the severity of this security note is medium.

The trust level is of type confirmed by the editor, with an origin of internet client.

This bulletin is about 2 vulnerabilities.

An attacker with a expert ability can exploit this cybersecurity note.

Solutions for this threat 

NTP.org: version ntp-4.2.8p2.
The version ntp-4.2.8p2 is fixed:
  http://support.ntp.org/download
  https://www.meinbergglobal.com/english/sw/ntp.htm

AIX: patch for ntp3.
A patch is available:
  ftp://aix.software.ibm.com/aix/efixes/security/ntp_fix3.tar

AIX: patch for ntp4.
A patch is available:
  https://aix.software.ibm.com/aix/efixes/security/ntp4_fix.tar

Cisco: solution for NTP.org.
The solution is indicated in information sources.

Debian: new ntp packages.
New packages are available:
  Debian 7: ntp 1:4.2.6.p5+dfsg-2+deb7u4

Extreme Networks: solution for NTP.
The solution is indicated in information sources.

F5 BIG-IP: solution for NTP.
The solution is indicated in information sources.

Fedora: new ntp packages.
New packages are available:
  Fedora 20: ntp 4.2.6p5-22.fc20
  Fedora 21: ntp 4.2.6p5-30.fc21

FreeBSD: patch for NTP.
A patch is available:
  https://security.FreeBSD.org/patches/SA-15:07/ntp.patch

HP Switch: fixed versions for NTP.
Fixed versions are indicated in information sources.

HP-UX: NTP version C.4.2.6.6.0.
The version HP-UX-NTP_C.4.2.6.6.0 is fixed:
  https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber=HPUX-NTP

Mandriva: new ntp packages.
New packages are available:
  Mandriva BS1: ntp 4.2.6p5-8.4.mbs1
  Mandriva BS2: ntp 4.2.6p5-16.3.mbs2

openSUSE: new ntp packages.
New packages are available:
  openSUSE 13.1: ntp 4.2.6p5-15.16.1
  openSUSE 13.2: ntp 4.2.6p5-25.12.1

RHEL 6: new ntp packages.
New packages are available:
  RHEL 6: ntp 4.2.6p5-5.el6

RHEL 7: new ntp packages.
New packages are available:
  RHEL 7: ntp 4.2.6p5-22.el7

Slackware: new ntp packages.
New packages are available:
  Slackware 13.0: ntp 4.2.8p2-*-1_slack13.0
  Slackware 13.1: ntp 4.2.8p2-*-1_slack13.1
  Slackware 13.37: ntp 4.2.8p2-*-1_slack13.37
  Slackware 14.0: ntp 4.2.8p2-*-1_slack14.0
  Slackware 14.1: ntp 4.2.8p2-*-1_slack14.1

Solaris: patch for Third Party (19/05/2015).
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

SUSE LE 10 SP4: new ntp packages.
New packages are available:
  SUSE LE 10 SP4: ntp 4.2.8p8-0.7.1

SUSE LE 10 SP4: new yast2-ntp-client packages.
New packages are available:
  SUSE LE 10 SP4: yast2-ntp-client 2.13.18-0.20.1

SUSE LE 11: new ntp packages.
New packages are available:
  SUSE LE 11: ntp 4.2.4p8-1.29.36.1

Ubuntu: new ntp packages.
New packages are available:
  Ubuntu 14.10: ntp 1:4.2.6.p5+dfsg-3ubuntu2.14.10.3
  Ubuntu 14.04 LTS: ntp 1:4.2.6.p5+dfsg-3ubuntu2.14.04.3
  Ubuntu 12.04 LTS: ntp 1:4.2.6.p3+dfsg-1ubuntu3.4
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides computer vulnerability analysis. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.