OracleVM 3.3 / 3.4 : ntp (OVMSA-2017-0165)

high Nessus Plugin ID 104204

Synopsis

The remote OracleVM host is missing one or more security updates.

Description

The remote OracleVM system is missing necessary patches to address critical security updates :

- add disable monitor to default ntp.conf [CVE-2013-5211]

- fix buffer overflow in datum refclock driver (CVE-2017-6462)

- fix crash with invalid unpeer command (CVE-2017-6463)

- fix potential crash with invalid server command (CVE-2017-6464)

- don't limit rate of packets from sources (CVE-2016-7426)

- don't change interface from received packets (CVE-2016-7429)

- fix calculation of root distance again (CVE-2016-7433)

- require authentication for trap commands (CVE-2016-9310)

- fix crash when reporting peer event to trappers (CVE-2016-9311)

- don't allow spoofed packets to demobilize associations (CVE-2015-7979, CVE-2016-1547)

- don't allow spoofed packet to enable symmetric interleaved mode (CVE-2016-1548)

- check mode of new source in config command (CVE-2016-2518)

- make MAC check resilient against timing attack (CVE-2016-1550)

Solution

Update the affected ntp / ntpdate packages.

See Also

http://www.nessus.org/u?7c1983e3

http://www.nessus.org/u?9454d3fb

Plugin Details

Severity: High

ID: 104204

File Name: oraclevm_OVMSA-2017-0165.nasl

Version: 3.5

Type: local

Published: 10/27/2017

Updated: 1/4/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.1

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:oracle:vm:ntp, p-cpe:/a:oracle:vm:ntpdate, cpe:/o:oracle:vm_server:3.3, cpe:/o:oracle:vm_server:3.4

Required KB Items: Host/local_checks_enabled, Host/OracleVM/release, Host/OracleVM/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/26/2017

Vulnerability Publication Date: 1/2/2014

Reference Information

CVE: CVE-2013-5211, CVE-2015-7979, CVE-2016-1547, CVE-2016-1548, CVE-2016-1550, CVE-2016-2518, CVE-2016-7426, CVE-2016-7429, CVE-2016-7433, CVE-2016-9310, CVE-2016-9311, CVE-2017-6462, CVE-2017-6463, CVE-2017-6464

BID: 64692