This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.
The remote Red Hat host is missing a security update.
Updated ntp packages to correct a security issue are now available for
Red Hat Enterprise Linux 4 and 5.
This update has been rated as having moderate security impact by the
Red Hat Security Response Team.
The Network Time Protocol (NTP) is used to synchronize a computer's
time with a referenced time source.
A flaw was discovered in the way the ntpd daemon checked the return
value of the OpenSSL EVP_VerifyFinal function. On systems using NTPv4
authentication, this could lead to an incorrect verification of
cryptographic signatures, allowing time-spoofing attacks.
Note: This issue only affects systems that have enabled NTP
authentication. By default, NTP authentication is not enabled.
All ntp users are advised to upgrade to the updated packages, which
contain a backported patch to resolve this issue. After installing the
update, the ntpd daemon will restart automatically.
See also :
Update the affected ntp package.
Risk factor :
Medium / CVSS Base Score : 5.8
CVSS Temporal Score : 5.0
Public Exploit Available : true
Family: Red Hat Local Security Checks
Nessus Plugin ID: 35551 ()
Bugtraq ID: 33150
CVE ID: CVE-2008-5077CVE-2009-0021CVE-2009-0046CVE-2009-0047CVE-2009-0048CVE-2009-0049CVE-2009-0124CVE-2009-0125CVE-2009-0127CVE-2009-0128CVE-2009-0130
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.