Rapid7 Vulnerability & Exploit Database

CentOS: (CVE-2015-5300) CESA-2015:1930: ntp

Back to Search

CentOS: (CVE-2015-5300) CESA-2015:1930: ntp

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
10/26/2015
Created
07/25/2018
Added
08/17/2018
Modified
08/17/2018

Description

The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).

Solution(s)

  • centos-upgrade-ntp
  • centos-upgrade-ntp-doc
  • centos-upgrade-ntp-perl
  • centos-upgrade-ntpdate
  • centos-upgrade-sntp

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;