AIX 7.1 TL 3 : ntp (IV68430)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote AIX host is missing a security patch.

Description :

The version of NTP installed on the remote AIX host is affected by
the following vulnerabilities :

- A security weakness exists due to the config_auth()
function improperly generating default keys when no
authentication key is defined in the ntp.conf file.
Key size is limited to 31 bits and the insecure
ntp_random() function is used, resulting in
cryptographically-weak keys with insufficient entropy. A
remote attacker can exploit this to defeat cryptographic
protection mechanisms via a brute-force attack.
(CVE-2014-9293)

- A security weakness exists due the use of a weak seed to
prepare a random number generator used to generate
symmetric keys. This allows a remote attacker to defeat
cryptographic protection mechanisms via a brute-force
attack. (CVE-2014-9294)

- Multiple stack-based buffer overflow conditions exist
due to improper validation of user-supplied input when
handling packets in the crypto_recv(), ctl_putdata(),
and configure() functions when using autokey
authentication. A remote attacker can exploit this, via
a specially crafted packet, to cause a denial of service
condition or the execution of arbitrary code.
(CVE-2014-9295)

See also :

http://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc

Solution :

Install the appropriate interim fix according to the vendor advisory.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: AIX Local Security Checks

Nessus Plugin ID: 81275 ()

Bugtraq ID: 71757
71761
71762

CVE ID: CVE-2014-9293
CVE-2014-9294
CVE-2014-9295

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now