Advisories ยป MGASA-2015-0413

Updated ntp packages fixes security vulnerabilities

Publication date: 25 Oct 2015
Modification date: 25 Oct 2015
Type: security
Affected Mageia releases : 5
CVE: CVE-2015-5300 , CVE-2015-7701 , CVE-2015-7691 , CVE-2015-7692 , CVE-2015-7702 , CVE-2015-7704 , CVE-2015-7852 , CVE-2015-7871

Description

It was found that ntpd did not correctly implement the threshold
limitation for the '-g' option, which is used to set the time without any
restrictions.

A man-in-the-middle attacker able to intercept NTP traffic between a
connecting client and an NTP server could use this flaw to force that
client to make multiple steps larger than the panic threshold, effectively
changing the time to an arbitrary value at any time (CVE-2015-5300).

Slow memory leak in CRYPTO_ASSOC with autokey (CVE-2015-7701).

Incomplete autokey data packet length checks could result in crash caused
by a crafted packet (CVE-2015-7691, CVE-2015-7692, CVE-2015-7702).

Clients that receive a KoD should validate the origin timestamp field
(CVE-2015-7704).

ntpq atoascii() Memory Corruption Vulnerability could result in ntpd crash
caused by a crafted packet (CVE-2015-7852).

Symmetric association authentication bypass via crypto-NAK
(CVE-2015-7871).
                

References

SRPMS

5/core