AIX 6.1 TL 6 : ntp4 (IV71094)

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.


Synopsis :

The remote AIX host is missing a security patch.

Description :

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9297 Network
Time Protocol (NTP) Project NTP daemon (ntpd) could allow a remote
attacker to conduct spoofing attacks, caused by insufficient entropy
in PRNG. An attacker could exploit this vulnerability to spoof the
IPv6 address ::1 to bypass ACLs and launch further attacks on the
system. Network Time Protocol (NTP) Project NTP daemon (ntpd) is
vulnerable to a denial of service, caused by an error when using
symmetric key authentication. By sending specially-crafted packets to
both peering hosts, an attacker could exploit this vulnerability to
prevent synchronization.

See also :

http://aix.software.ibm.com/aix/efixes/security/ntp4_advisory.asc

Solution :

Install the appropriate interim fix.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:A/AC:M/Au:N/C:N/I:P/A:P)

Family: AIX Local Security Checks

Nessus Plugin ID: 84492 ()

Bugtraq ID:

CVE ID: CVE-2014-9297
CVE-2015-1799

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now