The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them. |
|
 |
|
|
Synthesis of the vulnerability 
An attacker can use two vulnerabilities related to cryptographic features of NTP.org.
Vulnerable products: Cisco ASR, Cisco ACE, ASA, Cisco Catalyst, IOS by Cisco, IOS XE Cisco, IOS XR Cisco, Cisco IPS, Nexus by Cisco, NX-OS, Prime Infrastructure, Cisco PRSM, Cisco Router, Secure ACS, Debian, Black Diamond, ExtremeXOS, Summit, BIG-IP Hardware, TMOS, Fedora, FreeBSD, HP Switch, HP-UX, AIX, Meinberg NTP Server, NTP.org, openSUSE, Solaris, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity of this weakness: 2/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 07/04/2015.
Références of this bulletin: 2779, 2781, bulletinapr2015, c04679309, c05033748, cisco-sa-20150408-ntpd, CVE-2015-1798, CVE-2015-1799, DSA-3223-1, FEDORA-2015-5830, FEDORA-2015-5874, FreeBSD-SA-15:07.ntp, HPSBHF03557, HPSBUX03333, MDVSA-2015:202, ntp4_advisory, ntp_advisory3, openSUSE-SU-2015:0775-1, RHSA-2015:1459-01, RHSA-2015:2231-04, SOL16505, SOL16506, SSA:2015-111-08, SSRT102029, SUSE-SU-2015:1173-1, SUSE-SU-2016:1912-1, SUSE-SU-2016:2094-1, USN-2567-1, VIGILANCE-VUL-16548, VN-2015-006-NTP, VU#374268.
Description of the vulnerability 
Several vulnerabilities were announced in NTP.org.
An attacker can use a message without MAC (Message Authentication Code), in order to bypass the authentication using a symmetric key. [severity:2/4; 2779, CVE-2015-1798]
An attacker can spoof a packet between two servers paired with a symmetric association, in order to trigger a denial of service. [severity:2/4; 2781, CVE-2015-1799] Full bulletin, software filtering, emails, fixes, ... (Request your free trial)
This vulnerability bulletin impacts software or systems such as Cisco ASR, Cisco ACE, ASA, Cisco Catalyst, IOS by Cisco, IOS XE Cisco, IOS XR Cisco, Cisco IPS, Nexus by Cisco, NX-OS, Prime Infrastructure, Cisco PRSM, Cisco Router, Secure ACS, Debian, Black Diamond, ExtremeXOS, Summit, BIG-IP Hardware, TMOS, Fedora, FreeBSD, HP Switch, HP-UX, AIX, Meinberg NTP Server, NTP.org, openSUSE, Solaris, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Our Vigil@nce team determined that the severity of this security note is medium.
The trust level is of type confirmed by the editor, with an origin of internet client.
This bulletin is about 2 vulnerabilities.
An attacker with a expert ability can exploit this cybersecurity note.
Solutions for this threat 
NTP.org: version ntp-4.2.8p2.
The version ntp-4.2.8p2 is fixed:
http://support.ntp.org/download
https://www.meinbergglobal.com/english/sw/ntp.htm
AIX: patch for ntp3.
A patch is available:
ftp://aix.software.ibm.com/aix/efixes/security/ntp_fix3.tar
AIX: patch for ntp4.
A patch is available:
https://aix.software.ibm.com/aix/efixes/security/ntp4_fix.tar
Cisco: solution for NTP.org.
The solution is indicated in information sources.
Debian: new ntp packages.
New packages are available:
Debian 7: ntp 1:4.2.6.p5+dfsg-2+deb7u4
Extreme Networks: solution for NTP.
The solution is indicated in information sources.
F5 BIG-IP: solution for NTP.
The solution is indicated in information sources.
Fedora: new ntp packages.
New packages are available:
Fedora 20: ntp 4.2.6p5-22.fc20
Fedora 21: ntp 4.2.6p5-30.fc21
FreeBSD: patch for NTP.
A patch is available:
https://security.FreeBSD.org/patches/SA-15:07/ntp.patch
HP Switch: fixed versions for NTP.
Fixed versions are indicated in information sources.
HP-UX: NTP version C.4.2.6.6.0.
The version HP-UX-NTP_C.4.2.6.6.0 is fixed:
https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber=HPUX-NTP
Mandriva: new ntp packages.
New packages are available:
Mandriva BS1: ntp 4.2.6p5-8.4.mbs1
Mandriva BS2: ntp 4.2.6p5-16.3.mbs2
openSUSE: new ntp packages.
New packages are available:
openSUSE 13.1: ntp 4.2.6p5-15.16.1
openSUSE 13.2: ntp 4.2.6p5-25.12.1
RHEL 6: new ntp packages.
New packages are available:
RHEL 6: ntp 4.2.6p5-5.el6
RHEL 7: new ntp packages.
New packages are available:
RHEL 7: ntp 4.2.6p5-22.el7
Slackware: new ntp packages.
New packages are available:
Slackware 13.0: ntp 4.2.8p2-*-1_slack13.0
Slackware 13.1: ntp 4.2.8p2-*-1_slack13.1
Slackware 13.37: ntp 4.2.8p2-*-1_slack13.37
Slackware 14.0: ntp 4.2.8p2-*-1_slack14.0
Slackware 14.1: ntp 4.2.8p2-*-1_slack14.1
Solaris: patch for Third Party (19/05/2015).
A patch is available:
https://support.oracle.com/rs?type=doc&id=1448883.1
SUSE LE 10 SP4: new ntp packages.
New packages are available:
SUSE LE 10 SP4: ntp 4.2.8p8-0.7.1
SUSE LE 10 SP4: new yast2-ntp-client packages.
New packages are available:
SUSE LE 10 SP4: yast2-ntp-client 2.13.18-0.20.1
SUSE LE 11: new ntp packages.
New packages are available:
SUSE LE 11: ntp 4.2.4p8-1.29.36.1
Ubuntu: new ntp packages.
New packages are available:
Ubuntu 14.10: ntp 1:4.2.6.p5+dfsg-3ubuntu2.14.10.3
Ubuntu 14.04 LTS: ntp 1:4.2.6.p5+dfsg-3ubuntu2.14.04.3
Ubuntu 12.04 LTS: ntp 1:4.2.6.p3+dfsg-1ubuntu3.4
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)
Computer vulnerabilities tracking service 
Vigil@nce provides computer vulnerability analysis. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.
|