CVE-2015-5195

HIGH
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

ntp_openssl.m4 in ntpd in NTP before 4.2.7p112 allows remote attackers to cause a denial of service (segmentation fault) via a crafted statistics or filegen configuration command that is not enabled during compilation.

References

http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170926.html

http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169167.html

http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166992.html

http://rhn.redhat.com/errata/RHSA-2016-0780.html

http://rhn.redhat.com/errata/RHSA-2016-2583.html

http://www.debian.org/security/2015/dsa-3388

http://www.openwall.com/lists/oss-security/2015/08/25/3

http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html

http://www.securityfocus.com/bid/76474

http://www.ubuntu.com/usn/USN-2783-1

https://bugzilla.redhat.com/show_bug.cgi?id=1254544

https://github.com/ntp-project/ntp/commit/52e977d79a0c4ace997e5c74af429844da2f27be

https://www-01.ibm.com/support/docview.wss?uid=isg3T1024157

https://www-01.ibm.com/support/docview.wss?uid=swg21985122

https://www-01.ibm.com/support/docview.wss?uid=swg21986956

https://www-01.ibm.com/support/docview.wss?uid=swg21988706

https://www-01.ibm.com/support/docview.wss?uid=swg21989542

Details

Source: MITRE

Published: 2017-07-21

Updated: 2018-05-18

Type: CWE-20

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Tenable Plugins

View all (20 total)

IDNameProductFamilySeverity
125009EulerOS Virtualization 3.0.1.0 : ntp (EulerOS-SA-2019-1556)NessusHuawei Local Security Checks
critical
99822EulerOS 2.0 SP1 : ntp (EulerOS-SA-2016-1060)NessusHuawei Local Security Checks
high
97443F5 Networks BIG-IP : NTP vulnerabilities (K02360853)NessusF5 Networks Local Security Checks
high
95850Scientific Linux Security Update : ntp on SL7.x x86_64 (20161103)NessusScientific Linux Local Security Checks
high
95330CentOS 7 : ntp (CESA-2016:2583)NessusCentOS Local Security Checks
high
94705Oracle Linux 7 : ntp (ELSA-2016-2583)NessusOracle Linux Local Security Checks
high
94546RHEL 7 : ntp (RHSA-2016:2583)NessusRed Hat Local Security Checks
high
91539Scientific Linux Security Update : ntp on SL6.x i386/x86_64 (20160510)NessusScientific Linux Local Security Checks
high
91419OracleVM 3.3 / 3.4 : ntp (OVMSA-2016-0082)NessusOracleVM Local Security Checks
high
91169CentOS 6 : ntp (CESA-2016:0780)NessusCentOS Local Security Checks
high
91151Oracle Linux 6 : ntp (ELSA-2016-0780)NessusOracle Linux Local Security Checks
high
91076RHEL 6 : ntp (RHSA-2016:0780)NessusRed Hat Local Security Checks
high
89288Fedora 21 : ntp-4.2.6p5-34.fc21 (2015-77bfbc1bcd)NessusFedora Local Security Checks
critical
86682Debian DSA-3388-1 : ntp - security updateNessusDebian Local Security Checks
critical
86640Debian DLA-335-1 : ntp security updateNessusDebian Local Security Checks
critical
86631Network Time Protocol Daemon (ntpd) 3.x / 4.x < 4.2.8p4 Multiple VulnerabilitiesNessusMisc.
critical
86630Ubuntu 12.04 LTS / 14.04 LTS / 15.04 / 15.10 : ntp vulnerabilities (USN-2783-1)NessusUbuntu Local Security Checks
critical
86331Fedora 22 : ntp-4.2.6p5-33.fc22 (2015-14212)NessusFedora Local Security Checks
high
86027Fedora 23 : ntp-4.2.6p5-33.fc23 (2015-14213)NessusFedora Local Security Checks
high
85751Amazon Linux AMI : ntp (ALAS-2015-593)NessusAmazon Linux Local Security Checks
high