Overview
The NTP Project ntpd version 4.2.7 and pervious versions contain several vulnerabilities. ntp-keygen prior to version 4.2.7p230 also uses a non-cryptographic random number generator when generating symmetric keys. These vulnerabilities may affect ntpd acting as a server or client.
Description
The Network Time Protocol (NTP) provides networked systems and devices with a way to synchronize time for various services and applications. The reference implementation produced by the NTP Project (ntp.org) contains several vulnerabilities. CWE-290: Authentication Bypass by Spoofing - CVE-2014-9298 |
Impact
The buffer overflow vulnerabilities in ntpd may allow a remote unauthenticated attacker to execute arbitrary malicious code with the privilege level of the ntpd process. The weak default key and non-cryptographic random number generator in ntp-keygen may allow an attacker to gain information regarding the integrity checking and authentication encryption schemes. More specifically, the weak default key allows access to private mode and control mode queries that require authentication, if not restricted by the configuration. |
Solution
Apply an update |
Restrict status queries |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 7.5 | AV:N/AC:L/Au:N/C:P/I:P/A:P |
Temporal | 5.9 | E:POC/RL:OF/RC:C |
Environmental | 5.9 | CDP:ND/TD:H/CR:ND/IR:ND/AR:ND |
References
- http://support.ntp.org/bin/view/Main/SecurityNotice
- http://lists.ntp.org/pipermail/announce/2014-December/000122.html
- http://support.ntp.org/bin/view/Support/AccessRestrictions#Section_6.5.2
- http://www.ntp.org/downloads.html
- http://www.ntp.org/ntpfaq/NTP-s-algo-crypt.htm
- http://googleprojectzero.blogspot.com/2015/01/finding-and-exploiting-ntpd.html
- https://ics-cert.us-cert.gov/advisories/ICSA-14-353-01
Acknowledgements
The NTP Project credits Stephen Roettger and Neel Mehta of the Google Security Team for discovering these vulnerabilities.
This document was written by Garret Wassermann.
Other Information
CVE IDs: | CVE-2014-9293, CVE-2014-9294, CVE-2014-9295, CVE-2014-9296, CVE-2014-9297, CVE-2014-9298 |
Date Public: | 2014-12-19 |
Date First Published: | 2014-12-19 |
Date Last Updated: | 2015-10-27 02:22 UTC |
Document Revision: | 124 |