Advisories ยป MGASA-2016-0277

Updated openntpd/busybox packages fix security vulnerability

Publication date: 09 Aug 2016
Modification date: 09 Aug 2016
Type: security
Affected Mageia releases : 5
CVE: CVE-2016-6301

Description

The busybox NTP implementation doesn't check the NTP mode of packets
received on the server port and responds to any packet with the right
size. This includes responses from another NTP server. An attacker can
send a packet with a spoofed source address in order to create an infinite
loop of responses between two busybox NTP servers. Adding more packets to
the loop increases the traffic between the servers until one of them has a
fully loaded CPU and/or network (CVE-2016-6301).

The affected code originated from openntpd, which had fixed it upstream,
but the fix had not made it into Mageia's openntpd package.  It has also
been patched with the fix in this update.
                

References

SRPMS

5/core