CVE-2015-7974
Published: 26 January 2016
NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."
Notes
Author | Note |
---|---|
mdeslaur |
fedora has an alternate fix http://lists.ntp.org/pipermail/hackers/2016-January/007416.html |
Priority
Status
Package | Release | Status |
---|---|---|
ntp
Launchpad, Ubuntu, Debian |
precise |
Released
(1:4.2.6.p3+dfsg-1ubuntu3.11)
|
trusty |
Released
(1:4.2.6.p5+dfsg-3ubuntu2.14.04.10)
|
|
upstream |
Released
(4.2.8p6)
|
|
vivid |
Ignored
(end of life)
|
|
wily |
Ignored
(end of life)
|
|
xenial |
Released
(1:4.2.8p4+dfsg-3ubuntu5.3)
|
|
yakkety |
Not vulnerable
(1:4.2.8p4+dfsg-3ubuntu6)
|
|
zesty |
Not vulnerable
(1:4.2.8p4+dfsg-3ubuntu6)
|
|
Patches:
upstream: https://github.com/ntp-project/ntp/commit/71a962710bfe066f76da9679cf4cfdeffe34e95e vendor: http://pkgs.fedoraproject.org/cgit/rpms/ntp.git/tree/ntp-4.2.6p5-cve-2015-7974.patch |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.7 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Changed |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N |