Mandriva Linux Security Advisory : ntp (MDVSA-2015:202)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote Mandriva Linux host is missing one or more security
updates.

Description :

Multiple vulnerabilities has been found and corrected in ntp :

The symmetric-key feature in the receive function in ntp_proto.c in
ntpd in NTP before 4.2.8p2 requires a correct MAC only if the MAC
field has a nonzero length, which makes it easier for
man-in-the-middle attackers to spoof packets by omitting the MAC
(CVE-2015-1798).

The symmetric-key feature in the receive function in ntp_proto.c in
ntpd in NTP before 4.2.8p2 performs state-variable updates upon
receiving certain invalid packets, which makes it easier for
man-in-the-middle attackers to cause a denial of service
(synchronization loss) by spoofing the source IP address of a peer
(CVE-2015-1799).

The updated packages provides a solution for these security issues.

See also :

http://www.nessus.org/u?fec88bd0

Solution :

Update the affected ntp, ntp-client and / or ntp-doc packages.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:A/AC:M/Au:N/C:N/I:P/A:P)

Family: Mandriva Local Security Checks

Nessus Plugin ID: 82737 ()

Bugtraq ID:

CVE ID: CVE-2015-1798
CVE-2015-1799

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now