Lucene search

K
archlinuxArch LinuxASA-201606-4
HistoryJun 04, 2016 - 12:00 a.m.

ntp: distributed denial of service amplification

2016-06-0400:00:00
Arch Linux
lists.archlinux.org
15

0.923 High

EPSS

Percentile

99.0%

  • CVE-2016-4953 (distributed denial of service amplification)

An attacker who knows the origin timestamp and can send a spoofed packet
containing a CRYPTO-NAK to an ephemeral peer target before any other
response is sent can demobilize that association.
Credit to Miroslav Lichvar of Red Hat

  • CVE-2016-4954 (distributed denial of service amplification)

An attacker who is able to spoof packets with correct origin timestamps from
enough servers before the expected response packets arrive at the target
machine can affect some peer variables and, for example, cause a false leap
indication to be set. Credit to Jakub Prokes of Red Hat

  • CVE-2016-4955 (distributed denial of service amplification)

An attacker who is able to spoof a packet with a correct origin timestamp
before the expected response packet arrives at the target machine can send a
CRYPTO_NAK or a bad MAC and cause the association’s peer variables to be
cleared. If this can be done often enough, it will prevent that association
from working. Credit to Miroslav Lichvar of Red Hat

  • CVE-2016-4956 (distributed denial of service amplification)

The fix for NtpBug2978 does not cover broadcast associations, so broadcast
clients can be triggered to flip into interleave mode.
Credit to Miroslav Lichvar of Red Hat

  • CVE-2016-4957 (distributed denial of service amplification)

The fix for Sec 3007 in ntp-4.2.8p7 contained a bug that could cause ntpd to
crash. Credit to Nicolas Edet of Cisco

OSVersionArchitecturePackageVersionFilename
anyanyanyntp< 4.2.8.p8-1UNKNOWN