[arch-security] [ASA-201412-24] ntp: multiple issues
anthraxx at archlinux.org
Mon Dec 22 04:36:54 UTC 2014
Arch Linux Security Advisory ASA-201412-24
Date : 2014-12-22
CVE-ID : CVE-2014-9293 CVE-2014-9294 CVE-2014-9295 CVE-2014-9296
Package : ntp
Type : multiple issues
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE-2014
The package ntp before version 4.2.8-1 is vulnerable to multiple issues
including but not limited to arbitrary code execution, denial of service
and weak key generation.
Upgrade to 4.2.8-1.
# pacman -Syu "ntp>=4.2.8-1"
The problems have been fixed upstream in version 4.2.8.
Keys explicitly generated by "ntp-keygen -M" should be regenerated.
- CVE-2014-9293 (weak key generation)
ntpd generated a weak key for its internal use, with full administrative
privileges. Attackers could use this key to reconfigure ntpd (or to
exploit other vulnerabilities).
- CVE-2014-9294 (weak key generation)
The ntp-keygen utility generated weak MD5 keys with insufficient
entropy, which makes it easier for remote attackers to defeat
cryptographic protection mechanisms via a brute-force attack.
- CVE-2014-9295 (arbitrary code execution)
Multiple stack-based buffer overflows in allow remote attackers to
execute arbitrary code via a crafted packet, related to (1) the
crypto_recv function when the Autokey Authentication feature is used,
(2) the ctl_putdata function, and (3) the configure function.
- CVE-2014-9296 (unintended association change)
The receive function in ntp_proto.c continues to execute after detecting
a certain authentication error, which might allow remote attackers to
trigger an unintended association change via crafted packets.
A remote attacker is able to craft packets leading to arbitrary code
execution, denial of service or make use of a weak key generation flaw
to perform cryptographic attacks against the authentication.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 819 bytes
Desc: OpenPGP digital signature
More information about the arch-security