Lucene search

K
amazonAmazonALAS2-2021-1706
HistorySep 08, 2021 - 11:35 p.m.

Medium: ntp

2021-09-0823:35:00
alas.aws.amazon.com
23

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.7 High

AI Score

Confidence

High

0.967 High

EPSS

Percentile

99.7%

Issue Overview:

The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013. (CVE-2013-5211)

Affected Packages:

ntp

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update ntp to update your system.

New Packages:

aarch64:  
    ntp-4.2.8p15-3.amzn2.0.4.aarch64  
    ntpdate-4.2.8p15-3.amzn2.0.4.aarch64  
    sntp-4.2.8p15-3.amzn2.0.4.aarch64  
    ntp-debuginfo-4.2.8p15-3.amzn2.0.4.aarch64  
  
i686:  
    ntp-4.2.8p15-3.amzn2.0.4.i686  
    ntpdate-4.2.8p15-3.amzn2.0.4.i686  
    sntp-4.2.8p15-3.amzn2.0.4.i686  
    ntp-debuginfo-4.2.8p15-3.amzn2.0.4.i686  
  
noarch:  
    ntp-perl-4.2.8p15-3.amzn2.0.4.noarch  
    ntp-doc-4.2.8p15-3.amzn2.0.4.noarch  
  
src:  
    ntp-4.2.8p15-3.amzn2.0.4.src  
  
x86_64:  
    ntp-4.2.8p15-3.amzn2.0.4.x86_64  
    ntpdate-4.2.8p15-3.amzn2.0.4.x86_64  
    sntp-4.2.8p15-3.amzn2.0.4.x86_64  
    ntp-debuginfo-4.2.8p15-3.amzn2.0.4.x86_64  

Additional References

Red Hat: CVE-2013-5211

Mitre: CVE-2013-5211

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.7 High

AI Score

Confidence

High

0.967 High

EPSS

Percentile

99.7%