ArchLinux: 201606-4: ntp: distributed denial of service amplification
Summary
- CVE-2016-4953 (distributed denial of service amplification)
An attacker who knows the origin timestamp and can send a spoofed packet
containing a CRYPTO-NAK to an ephemeral peer target before any other
response is sent can demobilize that association.
Credit to Miroslav Lichvar of Red Hat
- CVE-2016-4954 (distributed denial of service amplification)
An attacker who is able to spoof packets with correct origin timestamps from
enough servers before the expected response packets arrive at the target
machine can affect some peer variables and, for example, cause a false leap
indication to be set. Credit to Jakub Prokes of Red Hat
- CVE-2016-4955 (distributed denial of service amplification)
An attacker who is able to spoof a packet with a correct origin timestamp
before the expected response packet arrives at the target machine can send a
CRYPTO_NAK or a bad MAC and cause the association's peer variables to be
cleared. If this can be done often enough, it will prevent that association
from working. Credit to Miroslav Lichvar of Red Hat
- CVE-2016-4956 (distributed denial of service amplification)
The fix for NtpBug2978 does not cover broadcast associations, so broadcast
clients can be triggered to flip into interleave mode.
Credit to Miroslav Lichvar of Red Hat
- CVE-2016-4957 (distributed denial of service amplification)
The fix for Sec 3007 in ntp-4.2.8p7 contained a bug that could cause ntpd to
crash. Credit to Nicolas Edet of Cisco
Resolution
Upgrade to 4.2.8.p8-1.
# pacman -Syu "ntp>=4.2.8.p8-1"
The problem has been fixed upstream in version 4.2.8.p8.
References
https://www.ntp.org/support/securitynotice/ntpbug3042/ https://access.redhat.com/security/cve/cve-2016-4956 https://www.ntp.org/support/securitynotice/ntpbug3043/ https://access.redhat.com/security/cve/cve-2016-4955 https://www.ntp.org/support/securitynotice/ntpbug3044/ https://access.redhat.com/security/cve/cve-2016-4954 https://www.ntp.org/support/securitynotice/ntpbug3045/ https://access.redhat.com/security/cve/cve-2016-4953 https://www.ntp.org/support/securitynotice/ntpbug3046/ https://access.redhat.com/security/cve/cve-2016-4957
Workaround
Implement ingress and egress filtering through BCP38.