OracleVM 3.3 : ntp (OVMSA-2015-0102)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote OracleVM host is missing one or more security updates.

Description :

The remote OracleVM system is missing necessary patches to address
critical security updates :

- reject packets without MAC when authentication is
enabled (CVE-2015-1798)

- protect symmetric associations with symmetric key
against DoS attack (CVE-2015-1799)

- fix generation of MD5 keys with ntp-keygen on big-endian
systems (CVE-2015-3405)

- log when stepping clock for leap second or ignoring it
with -x (#1204625)

- fix typos in ntpd man page (#1194463)

- validate lengths of values in extension fields
(CVE-2014-9297)

- drop packets with spoofed source address ::1
(CVE-2014-9298)

- add nanosecond support to SHM refclock (#1117704)

- allow creating all SHM segments with owner-only access
(#1122015)

- allow symmetric keys up to 32 bytes again (#1053551)

- fix calculation of root dispersion (#1045376)

- fix crash in ntpq mreadvar command (#1165141)

- don't step clock for leap second with -x option
(#1190619)

- don't drop packets with source port below 123 (#1171630)

- use larger RSA exponent in ntp-keygen (#1184421)

- refresh peers on routing updates (#1193850)

- increase memlock limit again (#1053568)

- warn when monitor can't be disabled due to limited
restrict (#1166596)

- improve documentation of restrict command (#1069019)

- update logconfig documentation for patched default
(#1193849)

- don't build ntpsnmpd (#995134)

See also :

https://oss.oracle.com/pipermail/oraclevm-errata/2015-July/000352.html
https://www.tenable.com/security/research/tra-2015-04

Solution :

Update the affected ntp / ntpdate packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: OracleVM Local Security Checks

Nessus Plugin ID: 85143 ()

Bugtraq ID: 72583
72584
73950
73951
74045

CVE ID: CVE-2014-9297
CVE-2014-9298
CVE-2015-1798
CVE-2015-1799
CVE-2015-3405

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now