CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
EPSS
Percentile
98.9%
The version of NTP installed on the remote AIX host is affected by the following vulnerabilities :
A time serving flaw exists in the trusted key system due to improper key checks. An authenticated, remote attacker can exploit this to perform impersonation attacks between authenticated peers. (CVE-2015-7974)
A denial of service vulnerability exists due to improper handling of a crafted Crypto NAK Packet with a source address spoofed to match that of an existing associated peer. An unauthenticated, remote attacker can exploit this to demobilize a client association. (CVE-2016-1547)
An information disclosure vulnerability exists in the message authentication functionality in libntp that is triggered during the handling of a series of specially crafted messages. An adjacent attacker can exploit this to partially recover the message digest key.
(CVE-2016-1550)
A flaw exists due to improper filtering of IPv4 ‘bogon’ packets received from a network. An unauthenticated, remote attacker can exploit this to spoof packets to appear to come from a specific reference clock.
(CVE-2016-1551)
A denial of service vulnerability exists that allows an authenticated, remote attacker to manipulate the value of the trustedkey, controlkey, or requestkey via a crafted packet, preventing authentication with ntpd until the daemon has been restarted. (CVE-2016-2517)
An out-of-bounds read error exists in the MATCH_ASSOC() function that occurs during the creation of peer associations with hmode greater than 7. An authenticated, remote attacker can exploit this, via a specially crafted packet, to cause a denial of service.
(CVE-2016-2518)
An overflow condition exists in the ctl_getitem() function in ntpd due to improper validation of user-supplied input when reporting return values. An authenticated, remote attacker can exploit this to cause ntpd to abort. (CVE-2016-2519)
A denial of service vulnerability exists when handling authentication due to improper packet timestamp checks.
An unauthenticated, remote attacker can exploit this, via a specially crafted and spoofed packet, to demobilize the ephemeral associations. (CVE-2016-4953)
A flaw exists that is triggered when handling spoofed packets. An unauthenticated, remote attacker can exploit this, via specially crafted packets, to affect peer variables (e.g., cause leap indications to be set). Note that the attacker must be able to spoof packets with correct origin timestamps from servers before expected response packets arrive. (CVE-2016-4954)
A flaw exists that is triggered when handling spoofed packets. An unauthenticated, remote attacker can exploit this, via specially crafted packets, to reset autokey associations. Note that the attacker must be able to spoof packets with correct origin timestamps from servers before expected response packets arrive.
(CVE-2016-4955)
A denial of service vulnerability exists when handling CRYPTO_NAK packets that allows an unauthenticated, remote attacker to cause a crash. (CVE-2016-4957)
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(99183);
script_version("1.10");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/04/21");
script_cve_id(
"CVE-2015-7974",
"CVE-2016-1547",
"CVE-2016-1550",
"CVE-2016-1551",
"CVE-2016-2517",
"CVE-2016-2518",
"CVE-2016-2519",
"CVE-2016-4953",
"CVE-2016-4954",
"CVE-2016-4955",
"CVE-2016-4957"
);
script_bugtraq_id(
81960,
88189,
88204,
88219,
88226,
88261,
88276,
91007,
91010
);
script_xref(name:"CERT", value:"321640");
script_xref(name:"CERT", value:"718152");
script_name(english:"AIX NTP v4 Advisory : ntp_advisory7.asc (IV87278) (IV87279)");
script_summary(english:"Checks the version of the ntp packages for appropriate iFixes.");
script_set_attribute(attribute:"synopsis", value:
"The remote AIX host has a version of NTP installed that is affected
by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The version of NTP installed on the remote AIX host is affected by
the following vulnerabilities :
- A time serving flaw exists in the trusted key system
due to improper key checks. An authenticated, remote
attacker can exploit this to perform impersonation
attacks between authenticated peers. (CVE-2015-7974)
- A denial of service vulnerability exists due to improper
handling of a crafted Crypto NAK Packet with a source
address spoofed to match that of an existing associated
peer. An unauthenticated, remote attacker can exploit
this to demobilize a client association. (CVE-2016-1547)
- An information disclosure vulnerability exists in the
message authentication functionality in libntp that is
triggered during the handling of a series of specially
crafted messages. An adjacent attacker can exploit this
to partially recover the message digest key.
(CVE-2016-1550)
- A flaw exists due to improper filtering of IPv4 'bogon'
packets received from a network. An unauthenticated,
remote attacker can exploit this to spoof packets to
appear to come from a specific reference clock.
(CVE-2016-1551)
- A denial of service vulnerability exists that allows an
authenticated, remote attacker to manipulate the value
of the trustedkey, controlkey, or requestkey via a
crafted packet, preventing authentication with ntpd
until the daemon has been restarted. (CVE-2016-2517)
- An out-of-bounds read error exists in the MATCH_ASSOC()
function that occurs during the creation of peer
associations with hmode greater than 7. An
authenticated, remote attacker can exploit this, via a
specially crafted packet, to cause a denial of service.
(CVE-2016-2518)
- An overflow condition exists in the ctl_getitem()
function in ntpd due to improper validation of
user-supplied input when reporting return values. An
authenticated, remote attacker can exploit this to cause
ntpd to abort. (CVE-2016-2519)
- A denial of service vulnerability exists when handling
authentication due to improper packet timestamp checks.
An unauthenticated, remote attacker can exploit this,
via a specially crafted and spoofed packet, to
demobilize the ephemeral associations. (CVE-2016-4953)
- A flaw exists that is triggered when handling spoofed
packets. An unauthenticated, remote attacker can exploit
this, via specially crafted packets, to affect peer
variables (e.g., cause leap indications to be set). Note
that the attacker must be able to spoof packets with
correct origin timestamps from servers before expected
response packets arrive. (CVE-2016-4954)
- A flaw exists that is triggered when handling spoofed
packets. An unauthenticated, remote attacker can exploit
this, via specially crafted packets, to reset autokey
associations. Note that the attacker must be able to
spoof packets with correct origin timestamps from
servers before expected response packets arrive.
(CVE-2016-4955)
- A denial of service vulnerability exists when handling
CRYPTO_NAK packets that allows an unauthenticated,
remote attacker to cause a crash. (CVE-2016-4957)");
script_set_attribute(attribute:"see_also", value:"https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc");
script_set_attribute(attribute:"solution", value:
"A fix is available and can be downloaded from the IBM AIX website.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"vuln_publication_date", value:"2015/12/12");
script_set_attribute(attribute:"patch_publication_date", value:"2016/09/06");
script_set_attribute(attribute:"plugin_publication_date", value:"2017/04/04");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:ibm:aix");
script_set_attribute(attribute:"cpe", value:"cpe:/a:ntp:ntp");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"AIX Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2017-2023 Tenable Network Security, Inc.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/AIX/lslpp", "Host/local_checks_enabled", "Host/AIX/version");
exit(0);
}
include("aix.inc");
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
oslevel = get_kb_item("Host/AIX/version");
if (isnull(oslevel)) audit(AUDIT_UNKNOWN_APP_VER, "AIX");
oslevel = oslevel - "AIX-";
if ( ! get_kb_item("Host/AIX/lslpp") ) audit(AUDIT_PACKAGE_LIST_MISSING);
if ( get_kb_item("Host/AIX/emgr_failure" ) ) exit(0, "This AIX package check is disabled because : "+get_kb_item("Host/AIX/emgr_failure") );
flag = 0;
aix_ntp_vulns = {
"6.1": {
"minfilesetver":"6.1.6.0",
"maxfilesetver":"6.1.6.7",
"patch":"(IV87278s7a|IV92287m5a|IV96311m5a)"
},
"7.1": {
"minfilesetver":"7.1.0.0",
"maxfilesetver":"7.1.0.7",
"patch":"(IV87279s7a|IV92287m5a|IV96312m5a)"
},
"7.2": {
"minfilesetver":"7.1.0.0",
"maxfilesetver":"7.1.0.7",
"patch":"(IV87279s7a|IV92126m3a|IV96312m5a)"
}
};
version_report = "AIX " + oslevel;
if ( empty_or_null(aix_ntp_vulns[oslevel]) ) {
os_options = join( sort( keys(aix_ntp_vulns) ), sep:' / ' );
audit(AUDIT_OS_NOT, os_options, version_report);
}
foreach oslevel ( keys(aix_ntp_vulns) ) {
package_info = aix_ntp_vulns[oslevel];
minfilesetver = package_info["minfilesetver"];
maxfilesetver = package_info["maxfilesetver"];
patch = package_info["patch"];
if (aix_check_ifix(release:oslevel, patch:patch, package:"ntp.rte", minfilesetver:minfilesetver, maxfilesetver:maxfilesetver) < 0) flag++;
}
if (flag)
{
aix_report_extra = ereg_replace(string:aix_report_get(), pattern:"[()]", replace:"");
aix_report_extra = ereg_replace(string:aix_report_extra, pattern:"[|]", replace:" or ");
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : aix_report_extra
);
}
else
{
tested = aix_pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ntp.rte");
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1551
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2517
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2519
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4953
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4954
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4955
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4957
aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
EPSS
Percentile
98.9%