Updated ntp packages fix security vulnerability
Publication date: 09 May 2017Modification date: 09 May 2017
Type: security
Affected Mageia releases : 5
CVE: CVE-2017-6451 , CVE-2017-6458 , CVE-2017-6462 , CVE-2017-6463 , CVE-2017-6464
Description
A vulnerability was found in NTP, in the legacy MX4200 refclock implementation. If this refclock was compiled in and used, an attacker may be able to induce stack overflow, leading to a crash or potential code execution (CVE-2017-6451). A vulnerability was found in NTP, in the building of response packets with custom fields. If custom fields were configured in ntp.conf with particularly long names, inclusion of these fields in the response packet could cause a buffer overflow, leading to a crash (CVE-2017-6458). A vulnerability was found in NTP, in the parsing of packets from the /dev/datum device. A malicious device could send crafted messages, causing ntpd to crash (CVE-2017-6462). A vulnerability was discovered in the NTP server's parsing of configuration directives. A remote, authenticated attacker could cause ntpd to crash by sending a crafted message (CVE-2017-6463). A vulnerability was discovered in the NTP server's parsing of configuration directives. A remote, authenticated attacker could cause ntpd to crash by sending a crafted message (CVE-2017-6464).
References
- https://bugs.mageia.org/show_bug.cgi?id=20595
- http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/4B7BMVXV53EE7XYW2KAVETDHTP452O3Z/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6451
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6458
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6462
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6463
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6464
SRPMS
5/core
- ntp-4.2.6p5-24.8.mga5