AIX 7.1 TL 3 : ntp (IV68430)

critical Nessus Plugin ID 81275

Synopsis

The remote AIX host is missing a security patch.

Description

The version of NTP installed on the remote AIX host is affected by the following vulnerabilities :

- A security weakness exists due to the config_auth() function improperly generating default keys when no authentication key is defined in the ntp.conf file.
Key size is limited to 31 bits and the insecure ntp_random() function is used, resulting in cryptographically-weak keys with insufficient entropy. A remote attacker can exploit this to defeat cryptographic protection mechanisms via a brute-force attack.
(CVE-2014-9293)

- A security weakness exists due the use of a weak seed to prepare a random number generator used to generate symmetric keys. This allows a remote attacker to defeat cryptographic protection mechanisms via a brute-force attack. (CVE-2014-9294)

- Multiple stack-based buffer overflow conditions exist due to improper validation of user-supplied input when handling packets in the crypto_recv(), ctl_putdata(), and configure() functions when using autokey authentication. A remote attacker can exploit this, via a specially crafted packet, to cause a denial of service condition or the execution of arbitrary code.
(CVE-2014-9295)

Solution

Install the appropriate interim fix according to the vendor advisory.

See Also

https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc

Plugin Details

Severity: Critical

ID: 81275

File Name: aix_IV68430.nasl

Version: 1.10

Type: local

Published: 2/11/2015

Updated: 4/21/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:ibm:aix:7.1

Required KB Items: Host/local_checks_enabled, Host/AIX/version, Host/AIX/lslpp

Exploit Ease: No known exploits are available

Patch Publication Date: 2/10/2015

Vulnerability Publication Date: 12/19/2014

Reference Information

CVE: CVE-2014-9293, CVE-2014-9294, CVE-2014-9295

BID: 71757, 71761, 71762

CERT: 852879