Rapid7 VulnDB

RHSA-2015:2520: ntp security update

Back to Search

RHSA-2015:2520: ntp security update

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
11/26/2015
Created
07/25/2018
Added
11/27/2015
Modified
10/30/2017

Description

The Network Time Protocol (NTP) is used to synchronize a computer's timewith a referenced time source.It was discovered that ntpd as a client did not correctly check timestampsin Kiss-of-Death packets. A remote attacker could use this flaw to send acrafted Kiss-of-Death packet to an ntpd client that would increase theclient's polling interval value, and effectively disable synchronizationwith the server. (CVE-2015-7704)Red Hat would like to thank Aanchal Malhotra, Isaac E. Cohen, and SharonGoldberg of Boston University for reporting this issue.All ntp users are advised to upgrade to these updated packages, whichcontain a backported patch to resolve this issue. After installing theupdate, the ntpd daemon will restart automatically.

Solution(s)

  • redhat-upgrade-ntp
  • redhat-upgrade-ntp-debuginfo
  • redhat-upgrade-ntp-doc
  • redhat-upgrade-ntp-perl
  • redhat-upgrade-ntpdate

References

  • redhat-upgrade-ntp
  • redhat-upgrade-ntp-debuginfo
  • redhat-upgrade-ntp-doc
  • redhat-upgrade-ntp-perl
  • redhat-upgrade-ntpdate

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;