CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
99.6%
Neel Mehta discovered that NTP generated weak authentication keys. A remote
attacker could possibly use this issue to brute force the authentication
key and send requests if permitted by IP restrictions. (CVE-2014-9293)
Stephen Roettger discovered that NTP generated weak MD5 keys. A remote
attacker could possibly use this issue to brute force the MD5 key and spoof
a client or server. (CVE-2014-9294)
Stephen Roettger discovered that NTP contained buffer overflows in the
crypto_recv(), ctl_putdata() and configure() functions. In non-default
configurations, a remote attacker could use these issues to cause NTP to
crash, resulting in a denial of service, or possibly execute arbitrary
code. The default compiler options for affected releases should reduce the
vulnerability to a denial of service. In addition, attackers would be
isolated by the NTP AppArmor profile. (CVE-2014-9295)
Stephen Roettger discovered that NTP incorrectly continued processing when
handling certain errors. (CVE-2014-9296)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 14.10 | noarch | ntp | < 1:4.2.6.p5+dfsg-3ubuntu2.14.10.1 | UNKNOWN |
Ubuntu | 14.10 | noarch | ntpdate | < 1:4.2.6.p5+dfsg-3ubuntu2.14.10.1 | UNKNOWN |
Ubuntu | 14.04 | noarch | ntp | < 1:4.2.6.p5+dfsg-3ubuntu2.14.04.1 | UNKNOWN |
Ubuntu | 14.04 | noarch | ntpdate | < 1:4.2.6.p5+dfsg-3ubuntu2.14.04.1 | UNKNOWN |
Ubuntu | 12.04 | noarch | ntp | < 1:4.2.6.p3+dfsg-1ubuntu3.2 | UNKNOWN |
Ubuntu | 12.04 | noarch | ntpdate | < 1:4.2.6.p3+dfsg-1ubuntu3.2 | UNKNOWN |
Ubuntu | 10.04 | noarch | ntp | < 1:4.2.4p8+dfsg-1ubuntu2.2 | UNKNOWN |
Ubuntu | 10.04 | noarch | ntpdate | < 1:4.2.4p8+dfsg-1ubuntu2.2 | UNKNOWN |