Rapid7 Vulnerability & Exploit Database

RHSA-2009:0046: ntp security update

Back to Search

RHSA-2009:0046: ntp security update

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
01/07/2009
Created
07/25/2018
Added
02/22/2009
Modified
07/04/2017

Description

The Network Time Protocol (NTP) is used to synchronize a computer's timewith a referenced time source.A flaw was discovered in the way the ntpd daemon checked the return valueof the OpenSSL EVP_VerifyFinal function. On systems using NTPv4authentication, this could lead to an incorrect verification ofcryptographic signatures, allowing time-spoofing attacks. (CVE-2009-0021)Note: This issue only affects systems that have enabled NTP authentication.By default, NTP authentication is not enabled.All ntp users are advised to upgrade to the updated packages, which containa backported patch to resolve this issue. After installing the update, thentpd daemon will restart automatically.

Solution(s)

  • redhat-upgrade-ntp

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;