CVE-2015-7976

MEDIUM
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.

References

http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html

http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html

http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html

http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html

http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html

http://support.ntp.org/bin/view/Main/NtpBug2938

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd

http://www.securitytracker.com/id/1034782

http://www.ubuntu.com/usn/USN-3096-1

https://bto.bluecoat.com/security-advisory/sa113

https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc

https://security.gentoo.org/glsa/201607-15

https://security.netapp.com/advisory/ntap-20171031-0001/

https://www.kb.cert.org/vuls/id/718152

Details

Source: MITRE

Published: 2017-01-30

Updated: 2018-10-30

Type: CWE-254

Risk Information

CVSS v2

Base Score: 4

Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N

Impact Score: 2.9

Exploitability Score: 8

Severity: MEDIUM

CVSS v3

Base Score: 4.3

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Impact Score: 1.4

Exploitability Score: 2.8

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:ntp:ntp:4.1.2:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:a:ntp:ntp:*:p5:*:*:*:*:*:* versions up to 4.2.8 (inclusive)

Configuration 3

OR

cpe:2.3:a:ntp:ntp:4.3.0:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.1:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.2:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.3:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.4:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.5:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.6:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.7:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.8:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.9:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.10:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.11:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.12:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.13:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.14:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.15:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.16:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.17:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.18:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.19:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.20:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.21:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.22:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.23:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.24:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.25:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.26:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.27:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.28:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.29:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.30:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.31:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.32:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.33:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.34:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.35:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.36:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.37:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.38:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.39:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.40:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.41:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.42:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.43:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.44:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.45:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.46:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.47:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.48:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.49:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.50:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.51:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.52:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.53:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.54:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.55:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.56:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.57:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.58:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.59:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.60:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.61:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.62:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.63:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.64:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.65:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.66:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.67:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.68:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.69:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.70:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.71:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.72:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.73:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.74:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.75:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.76:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.77:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.78:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.79:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.80:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.81:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.82:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.83:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.84:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.85:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.86:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.87:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.88:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.89:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*

cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*

cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*

cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*

cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*

cpe:2.3:o:novell:suse_openstack_cloud:5:*:*:*:*:*:*:*

cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*

cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*

cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*

cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*

cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*

Tenable Plugins

View all (18 total)

IDNameProductFamilySeverity
129259EulerOS 2.0 SP3 : ntp (EulerOS-SA-2019-2066)NessusHuawei Local Security Checks
critical
126847EulerOS 2.0 SP2 : ntp (EulerOS-SA-2019-1719)NessusHuawei Local Security Checks
critical
125010EulerOS Virtualization 3.0.1.0 : ntp (EulerOS-SA-2019-1557)NessusHuawei Local Security Checks
critical
124450EulerOS 2.0 SP5 : ntp (EulerOS-SA-2019-1323)NessusHuawei Local Security Checks
critical
123698EulerOS Virtualization 2.5.3 : ntp (EulerOS-SA-2019-1230)NessusHuawei Local Security Checks
medium
106499pfSense < 2.3 Multiple Vulnerabilities (SA-16_01 - SA-16_02)NessusFirewalls
critical
93896Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS : ntp vulnerabilities (USN-3096-1)NessusUbuntu Local Security Checks
high
93186SUSE SLES10 Security Update : ntp (SUSE-SU-2016:1912-1)NessusSuSE Local Security Checks
critical
92485GLSA-201607-15 : NTP: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
91403openSUSE Security Update : ntp (openSUSE-2016-649)NessusSuSE Local Security Checks
critical
91248SUSE SLES11 Security Update : ntp (SUSE-SU-2016:1311-1)NessusSuSE Local Security Checks
critical
91111openSUSE Security Update : ntp (openSUSE-2016-578)NessusSuSE Local Security Checks
high
90991SUSE SLED12 / SLES12 Security Update : ntp (SUSE-SU-2016:1247-1)NessusSuSE Local Security Checks
critical
90821SUSE SLED12 / SLES12 Security Update : ntp (SUSE-SU-2016:1177-1)NessusSuSE Local Security Checks
high
90820SUSE SLES11 Security Update : ntp (SUSE-SU-2016:1175-1)NessusSuSE Local Security Checks
high
88912Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : ntp (SSA:2016-054-04)NessusSlackware Local Security Checks
high
88068FreeBSD : ntp -- multiple vulnerabilities (5237f5d7-c020-11e5-b397-d050996490d0)NessusFreeBSD Local Security Checks
high
88054Network Time Protocol Daemon (ntpd) 3.x / 4.x < 4.2.8p6 Multiple VulnerabilitiesNessusMisc.
medium