Lucene search

K
openvasCopyright (C) 2021 Greenbone AGOPENVAS:1361412562310150699
HistoryJun 21, 2021 - 12:00 a.m.

NTP < 4.2.8p5 DoS Vulnerability

2021-06-2100:00:00
Copyright (C) 2021 Greenbone AG
plugins.openvas.org
3

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

8.7 High

AI Score

Confidence

High

0.042 Low

EPSS

Percentile

92.3%

If ntpd is always started with the -g option, which is common
and against long-standing recommendation, and if at the moment ntpd is restarted an attacker can
immediately respond to enough requests from enough sources trusted by the target, which is
difficult and not common, there is a window of opportunity where the attacker can cause ntpd to
set the time to an arbitrary value. Similarly, if an attacker is able to respond to enough
requests from enough sources trusted by the target, the attacker can cause ntpd to abort and
restart, at which point it can tell the target to set the time to an arbitrary value if and only
if ntpd was re-started against long-standing recommendation with the -g flag, or if ntpd was not
given the -g flag, the attacker can move the target system

# SPDX-FileCopyrightText: 2021 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:ntp:ntp";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.150699");
  script_version("2024-02-20T05:05:48+0000");
  script_tag(name:"last_modification", value:"2024-02-20 05:05:48 +0000 (Tue, 20 Feb 2024)");
  script_tag(name:"creation_date", value:"2021-06-21 09:34:21 +0000 (Mon, 21 Jun 2021)");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2018-10-30 00:00:00 +0000 (Tue, 30 Oct 2018)");

  script_cve_id("CVE-2015-5300");

  script_tag(name:"qod_type", value:"remote_banner_unreliable");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("NTP < 4.2.8p5 DoS Vulnerability");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2021 Greenbone AG");
  script_family("Denial of Service");
  script_dependencies("ntp_open.nasl", "gb_ntp_detect_lin.nasl");
  script_mandatory_keys("ntpd/version/detected");

  script_tag(name:"summary", value:"If ntpd is always started with the -g option, which is common
  and against long-standing recommendation, and if at the moment ntpd is restarted an attacker can
  immediately respond to enough requests from enough sources trusted by the target, which is
  difficult and not common, there is a window of opportunity where the attacker can cause ntpd to
  set the time to an arbitrary value. Similarly, if an attacker is able to respond to enough
  requests from enough sources trusted by the target, the attacker can cause ntpd to abort and
  restart, at which point it can tell the target to set the time to an arbitrary value if and only
  if ntpd was re-started against long-standing recommendation with the -g flag, or if ntpd was not
  given the -g flag, the attacker can move the target system's time by at most 900 seconds' time per
  attack.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"Please see the references for more information on the vulnerabilities.");

  script_tag(name:"affected", value:"NTPd version prior to 4.2.8p5, 4.3.x prior to version 4.3.78.");

  script_tag(name:"solution", value:"Update to version 4.2.8p5, 4.3.78 or later.");

  script_xref(name:"URL", value:"http://support.ntp.org/bin/view/Main/NtpBug2956");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if (isnull(port = get_app_port(cpe: CPE)))
  exit(0);

if (!infos = get_app_full(cpe: CPE, port: port, exit_no_version: TRUE))
  exit(0);

version = infos["version"];
location = infos["location"];
proto = infos["proto"];

if (version_is_less(version: version, test_version: "4.2.8p5")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "4.2.8p5", install_path: location);
  security_message(port: port, proto: proto, data: report);
  exit(0);
}

if (version_in_range(version: version, test_version: "4.3.0", test_version2: "4.3.77")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "4.3.78", install_path: location);
  security_message(port: port, proto: proto, data: report);
  exit(0);
}

exit(99);

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

8.7 High

AI Score

Confidence

High

0.042 Low

EPSS

Percentile

92.3%