vulnerability
NTP: Time and State (CVE-2015-5300)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Jul 21, 2017 | Feb 23, 2023 | Mar 1, 2023 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Jul 21, 2017
Added
Feb 23, 2023
Modified
Mar 1, 2023
Description
The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).
Solution
ntp-upgrade-latest
References
- BID-77312
- CVE-2015-5300
- https://attackerkb.com/topics/CVE-2015-5300
- DEBIAN-DSA-3388
- DISA_SEVERITY-Category I
- IAVM-2017-A-0028
- REDHAT-RHSA-2015:1930
- URL-http://aix.software.ibm.com/aix/efixes/security/ntp_advisory5.asc
- URL-http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170684.html
- URL-http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170926.html
- URL-http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.html
- URL-http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html
- URL-http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html
- URL-http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html
- URL-http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html
- URL-http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html
- URL-http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html
- URL-http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html
- URL-http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html
- URL-http://rhn.redhat.com/errata/RHSA-2015-1930.html
- URL-http://seclists.org/bugtraq/2016/Feb/164
- URL-http://support.ntp.org/bin/view/Main/NtpBug2956
- URL-http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p5_Securit
- URL-http://www.debian.org/security/2015/dsa-3388
- URL-http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- URL-http://www.securityfocus.com/bid/77312
- URL-http://www.securitytracker.com/id/1034670
- URL-http://www.ubuntu.com/usn/USN-2783-1
- URL-https://bto.bluecoat.com/security-advisory/sa113
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=1271076
- URL-https://ics-cert.us-cert.gov/advisories/ICSA-15-356-01
- URL-https://security.netapp.com/advisory/ntap-20171004-0001/
- URL-https://support.citrix.com/article/CTX220112
- URL-https://www-01.ibm.com/support/docview.wss?uid=isg3T1023885
- URL-https://www-01.ibm.com/support/docview.wss?uid=isg3T1024073
- URL-https://www-01.ibm.com/support/docview.wss?uid=nas8N1021264
- URL-https://www-01.ibm.com/support/docview.wss?uid=ssg1S1005821
- URL-https://www-01.ibm.com/support/docview.wss?uid=swg21979393
- URL-https://www-01.ibm.com/support/docview.wss?uid=swg21980676
- URL-https://www-01.ibm.com/support/docview.wss?uid=swg21983501
- URL-https://www-01.ibm.com/support/docview.wss?uid=swg21983506
- URL-https://www.cs.bu.edu/~goldbe/NTPattack.html
- URL-https://www.freebsd.org/security/advisories/FreeBSD-SA-16:02.ntp.asc
- URL-https://www.ibm.com/support/home/docdisplay?lndocid=migr-5099428
- URL-https://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- URL-https://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.