Advisories ยป MGASA-2016-0219

Updated ntp packages fix security vulnerability

Publication date: 07 Jun 2016
Modification date: 07 Jun 2016
Type: security
Affected Mageia releases : 5
CVE: CVE-2015-8139 , CVE-2016-4954 , CVE-2016-4955 , CVE-2016-4956

Description

ntpq and ntpdc disclose the origin timestamp to unauthenticated clients,
which may allow an attacker to impersonate a legitimate peer
(CVE-2015-8139).

An attacker who is able to spoof packets with correct origin timestamps
from enough servers before the expected response packets arrive at the
target machine can affect some peer variables and, for example, cause a
false leap indication to be set (CVE-2016-4954).

An attacker who is able to spoof a packet with a correct origin timestamp
before the expected response packet arrives at the target machine can send
a CRYPTO_NAK or a bad MAC and cause the association's peer variables to be
cleared. If this can be done often enough, it will prevent that
association from working (CVE-2016-4955).

The fix for CVE-2016-1548 does not cover broadcast associations, so
broadcast clients can be triggered to flip into interleave mode
(CVE-2016-4956).
                

References

SRPMS

5/core