5.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
0.352 Low
EPSS
Percentile
97.2%
Security Fix(es) :
It was found that the fix for CVE-2014-9750 was incomplete: three issues were found in the value length checks in NTP’s ntp_crypto.c, where a packet with particular autokey operations that contained malicious data was not always being completely validated. A remote attacker could use a specially crafted NTP packet to crash ntpd. (CVE-2015-7691, CVE-2015-7692, CVE-2015-7702)
A memory leak flaw was found in ntpd’s CRYPTO_ASSOC. If ntpd was configured to use autokey authentication, an attacker could send packets to ntpd that would, after several days of ongoing attack, cause it to run out of memory. (CVE-2015-7701)
An off-by-one flaw, leading to a buffer overflow, was found in cookedprint functionality of ntpq. A specially crafted NTP packet could potentially cause ntpq to crash. (CVE-2015-7852)
A NULL pointer dereference flaw was found in the way ntpd processed ‘ntpdc reslist’ commands that queried restriction lists with a large amount of entries. A remote attacker could potentially use this flaw to crash ntpd. (CVE-2015-7977)
A stack-based buffer overflow flaw was found in the way ntpd processed ‘ntpdc reslist’ commands that queried restriction lists with a large amount of entries. A remote attacker could use this flaw to crash ntpd.
(CVE-2015-7978)
It was found that ntpd could crash due to an uninitialized variable when processing malformed logconfig configuration commands. (CVE-2015-5194)
It was found that ntpd would exit with a segmentation fault when a statistics type that was not enabled during compilation (e.g. timingstats) was referenced by the statistics or filegen configuration command.
(CVE-2015-5195)
It was discovered that the sntp utility could become unresponsive due to being caught in an infinite loop when processing a crafted NTP packet. (CVE-2015-5219)
It was found that NTP’s :config command could be used to set the pidfile and driftfile paths without any restrictions. A remote attacker could use this flaw to overwrite a file on the file system with a file containing the pid of the ntpd process (immediately) or the current estimated drift of the system clock (in hourly intervals). (CVE-2015-7703)
The CVE-2015-5219 and CVE-2015-7703 issues were discovered by Miroslav Lichvr (Red Hat).
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text is (C) Scientific Linux.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(91539);
script_version("2.8");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
script_cve_id("CVE-2014-9750", "CVE-2015-5194", "CVE-2015-5195", "CVE-2015-5219", "CVE-2015-7691", "CVE-2015-7692", "CVE-2015-7701", "CVE-2015-7702", "CVE-2015-7703", "CVE-2015-7852", "CVE-2015-7977", "CVE-2015-7978");
script_xref(name:"TRA", value:"TRA-2015-04");
script_name(english:"Scientific Linux Security Update : ntp on SL6.x i386/x86_64 (20160510)");
script_summary(english:"Checks rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:
"The remote Scientific Linux host is missing one or more security
updates."
);
script_set_attribute(
attribute:"description",
value:
"Security Fix(es) :
- It was found that the fix for CVE-2014-9750 was
incomplete: three issues were found in the value length
checks in NTP's ntp_crypto.c, where a packet with
particular autokey operations that contained malicious
data was not always being completely validated. A remote
attacker could use a specially crafted NTP packet to
crash ntpd. (CVE-2015-7691, CVE-2015-7692,
CVE-2015-7702)
- A memory leak flaw was found in ntpd's CRYPTO_ASSOC. If
ntpd was configured to use autokey authentication, an
attacker could send packets to ntpd that would, after
several days of ongoing attack, cause it to run out of
memory. (CVE-2015-7701)
- An off-by-one flaw, leading to a buffer overflow, was
found in cookedprint functionality of ntpq. A specially
crafted NTP packet could potentially cause ntpq to
crash. (CVE-2015-7852)
- A NULL pointer dereference flaw was found in the way
ntpd processed 'ntpdc reslist' commands that queried
restriction lists with a large amount of entries. A
remote attacker could potentially use this flaw to crash
ntpd. (CVE-2015-7977)
- A stack-based buffer overflow flaw was found in the way
ntpd processed 'ntpdc reslist' commands that queried
restriction lists with a large amount of entries. A
remote attacker could use this flaw to crash ntpd.
(CVE-2015-7978)
- It was found that ntpd could crash due to an
uninitialized variable when processing malformed
logconfig configuration commands. (CVE-2015-5194)
- It was found that ntpd would exit with a segmentation
fault when a statistics type that was not enabled during
compilation (e.g. timingstats) was referenced by the
statistics or filegen configuration command.
(CVE-2015-5195)
- It was discovered that the sntp utility could become
unresponsive due to being caught in an infinite loop
when processing a crafted NTP packet. (CVE-2015-5219)
- It was found that NTP's :config command could be used to
set the pidfile and driftfile paths without any
restrictions. A remote attacker could use this flaw to
overwrite a file on the file system with a file
containing the pid of the ntpd process (immediately) or
the current estimated drift of the system clock (in
hourly intervals). (CVE-2015-7703)
The CVE-2015-5219 and CVE-2015-7703 issues were discovered by Miroslav
Lichvr (Red Hat)."
);
# https://listserv.fnal.gov/scripts/wa.exe?A2=ind1606&L=scientific-linux-errata&F=&S=&P=1297
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?ef45218d"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.tenable.com/security/research/tra-2015-04"
);
script_set_attribute(attribute:"solution", value:"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:P");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:ntp");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:ntp-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:ntp-doc");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:ntp-perl");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:ntpdate");
script_set_attribute(attribute:"cpe", value:"x-cpe:/o:fermilab:scientific_linux");
script_set_attribute(attribute:"vuln_publication_date", value:"2015/10/06");
script_set_attribute(attribute:"patch_publication_date", value:"2016/05/10");
script_set_attribute(attribute:"plugin_publication_date", value:"2016/06/09");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Scientific Linux Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Scientific Linux " >!< release) audit(AUDIT_HOST_NOT, "running Scientific Linux");
os_ver = pregmatch(pattern: "Scientific Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Scientific Linux");
os_ver = os_ver[1];
if (! preg(pattern:"^6([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Scientific Linux 6.x", "Scientific Linux " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Scientific Linux", cpu);
flag = 0;
if (rpm_check(release:"SL6", reference:"ntp-4.2.6p5-10.el6")) flag++;
if (rpm_check(release:"SL6", reference:"ntp-debuginfo-4.2.6p5-10.el6")) flag++;
if (rpm_check(release:"SL6", reference:"ntp-doc-4.2.6p5-10.el6")) flag++;
if (rpm_check(release:"SL6", reference:"ntp-perl-4.2.6p5-10.el6")) flag++;
if (rpm_check(release:"SL6", reference:"ntpdate-4.2.6p5-10.el6")) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ntp / ntp-debuginfo / ntp-doc / ntp-perl / ntpdate");
}
Vendor | Product | Version | CPE |
---|---|---|---|
fermilab | scientific_linux | ntp | p-cpe:/a:fermilab:scientific_linux:ntp |
fermilab | scientific_linux | ntp-debuginfo | p-cpe:/a:fermilab:scientific_linux:ntp-debuginfo |
fermilab | scientific_linux | ntp-doc | p-cpe:/a:fermilab:scientific_linux:ntp-doc |
fermilab | scientific_linux | ntp-perl | p-cpe:/a:fermilab:scientific_linux:ntp-perl |
fermilab | scientific_linux | ntpdate | p-cpe:/a:fermilab:scientific_linux:ntpdate |
fermilab | scientific_linux | x-cpe:/o:fermilab:scientific_linux |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9750
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978
www.nessus.org/u?ef45218d
www.tenable.com/security/research/tra-2015-04
5.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
0.352 Low
EPSS
Percentile
97.2%