Debian: DSA-3629-1: ntp security update

    Date25 Jul 2016
    CategoryDebian
    67
    Posted ByLinuxSecurity Advisories
    Several vulnerabilities were discovered in the Network Time Protocol daemon and utility programs: CVE-2015-7974
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-3629-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                       Moritz Muehlenhoff
    July 25, 2016                         https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : ntp
    CVE ID         : CVE-2015-7974 CVE-2015-7977 CVE-2015-7978 CVE-2015-7979 
                     CVE-2015-8138 CVE-2015-8158 CVE-2016-1547 CVE-2016-1548
                     CVE-2016-1550 CVE-2016-2516 CVE-2016-2518
    
    Several vulnerabilities were discovered in the Network Time Protocol
    daemon and utility programs:
    
    CVE-2015-7974
    
        Matt Street discovered that insufficient key validation allows
        impersonation attacks between authenticated peers.
    
    CVE-2015-7977 / CVE-2015-7978
    
        Stephen Gray discovered that a NULL pointer dereference and a
        buffer overflow in the handling of "ntpdc reslist" commands may
        result in denial of service.
    
    CVE-2015-7979
    
        Aanchal Malhotra discovered that if NTP is configured for broadcast
        mode, an attacker can send malformed authentication packets which
        break associations with the server for other broadcast clients.
    
    CVE-2015-8138
    
        Matthew van Gundy and Jonathan Gardner discovered that missing
        validation of origin timestamps in ntpd clients may result in denial
        of service.
    
    CVE-2015-8158
    
        Jonathan Gardner discovered that missing input sanitising in ntpq
        may result in denial of service.
    
    CVE-2016-1547
    
        Stephen Gray and Matthew van Gundy discovered that incorrect handling
        of crypto NAK packets my result in denial of service.
    
    CVE-2016-1548
    
        Jonathan Gardner and Miroslav Lichvar discovered that ntpd clients
        could be forced to change from basic client/server mode to interleaved
        symmetric mode, preventing time synchronisation.
    
    CVE-2016-1550
    
        Matthew van Gundy, Stephen Gray and Loganaden Velvindron discovered
        that timing leaks in the the packet authentication code could result
        in recovery of a message digest.
    
    CVE-2016-2516
    
        Yihan Lian discovered that duplicate IPs on "unconfig" directives will
        trigger an assert.
    
    CVE-2016-2518
    
        Yihan Lian discovered that an OOB memory access could potentially
        crash ntpd.
    
    For the stable distribution (jessie), these problems have been fixed in
    version 1:4.2.6.p5+dfsg-7+deb8u2.
    
    For the testing distribution (stretch), these problems have been fixed
    in version 1:4.2.8p7+dfsg-1.
    
    For the unstable distribution (sid), these problems have been fixed in
    version 1:4.2.8p7+dfsg-1.
    
    We recommend that you upgrade your ntp packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"24","type":"x","order":"1","pct":54.55,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":11.36,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"15","type":"x","order":"3","pct":34.09,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.