CVE-2016-2517

MEDIUM

Description

NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (prevent subsequent authentication) by leveraging knowledge of the controlkey or requestkey and sending a crafted packet to ntpd, which changes the value of trustedkey, controlkey, or requestkey. NOTE: this vulnerability exists because of a CVE-2016-2516 regression.

References

http://support.ntp.org/bin/view/Main/NtpBug3010

http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html

http://www.securityfocus.com/bid/88189

http://www.securitytracker.com/id/1035705

https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc

https://security.gentoo.org/glsa/201607-15

https://security.netapp.com/advisory/ntap-20171004-0002/

https://www.kb.cert.org/vuls/id/718152

Details

Source: MITRE

Published: 2017-01-30

Updated: 2017-11-21

Type: CWE-20

Risk Information

CVSS v2.0

Base Score: 4.9

Vector: AV:N/AC:H/Au:S/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 3.9

Severity: MEDIUM

CVSS v3.0

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 1.6

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:ntp:ntp:*:p6:*:*:*:*:*:* versions up to 4.2.8 (inclusive)

Configuration 2

OR

cpe:2.3:a:ntp:ntp:4.3.0:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.1:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.2:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.3:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.4:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.5:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.6:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.7:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.8:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.9:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.10:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.11:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.12:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.13:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.14:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.15:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.16:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.17:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.18:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.19:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.20:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.21:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.22:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.23:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.24:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.25:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.26:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.27:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.28:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.29:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.30:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.31:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.32:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.33:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.34:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.35:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.36:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.37:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.38:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.39:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.40:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.41:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.42:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.43:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.44:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.45:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.46:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.47:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.48:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.49:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.50:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.51:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.52:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.53:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.54:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.55:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.56:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.57:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.58:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.59:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.60:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.61:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.62:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.63:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.64:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.65:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.66:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.67:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.68:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.69:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.70:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.71:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.72:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.73:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.74:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.75:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.76:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.77:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.78:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.79:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.80:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.81:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.82:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.83:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.84:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.85:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.86:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.87:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.88:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.89:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.90:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.3.91:*:*:*:*:*:*:*

Tenable Plugins

View all (20 total)

IDNameProductFamilySeverity
132172EulerOS 2.0 SP3 : ntp (EulerOS-SA-2019-2637)NessusHuawei Local Security Checks
medium
131600EulerOS 2.0 SP2 : ntp (EulerOS-SA-2019-2446)NessusHuawei Local Security Checks
medium
104100Juniper Junos Space < 17.1R1 Multiple Vulnerabilities (JSA10826)NessusJunos Local Security Checks
high
102128AIX NTP v3 Advisory : ntp_advisory7.asc (IV87614) (IV87419) (IV87615) (IV87420) (IV87939)NessusAIX Local Security Checks
medium
99183AIX NTP v4 Advisory : ntp_advisory7.asc (IV87278) (IV87279)NessusAIX Local Security Checks
medium
93352AIX 7.2 TL 0 : ntp (IV87939) (deprecated)NessusAIX Local Security Checks
medium
93351AIX 7.1 TL 3 : ntp (IV87615) (deprecated)NessusAIX Local Security Checks
medium
93350AIX 5.3 TL 12 : ntp (IV87614) (deprecated)NessusAIX Local Security Checks
medium
93349AIX 7.1 TL 4 : ntp (IV87420) (deprecated)NessusAIX Local Security Checks
medium
93348AIX 6.1 TL 9 : ntp (IV87419) (deprecated)NessusAIX Local Security Checks
medium
93186SUSE SLES10 Security Update : ntp (SUSE-SU-2016:1912-1)NessusSuSE Local Security Checks
high
92485GLSA-201607-15 : NTP: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
91663SUSE SLED12 / SLES12 Security Update : ntp (SUSE-SU-2016:1568-1)NessusSuSE Local Security Checks
high
91403openSUSE Security Update : ntp (openSUSE-2016-649)NessusSuSE Local Security Checks
high
91269openSUSE Security Update : ntp (openSUSE-2016-599)NessusSuSE Local Security Checks
high
91159SUSE SLED12 / SLES12 Security Update : ntp (SUSE-SU-2016:1291-1)NessusSuSE Local Security Checks
high
91120SUSE SLES11 Security Update : ntp (SUSE-SU-2016:1278-1)NessusSuSE Local Security Checks
high
90923Network Time Protocol Daemon (ntpd) 3.x / 4.x < 4.2.8p7 Multiple VulnerabilitiesNessusMisc.
high
90800Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : ntp (SSA:2016-120-01)NessusSlackware Local Security Checks
high
90742FreeBSD : ntp -- multiple vulnerabilities (b2487d9a-0c30-11e6-acd0-d050996490d0)NessusFreeBSD Local Security Checks
high