OracleVM 3.3 / 3.4 : ntp (OVMSA-2017-0165)

High Nessus Plugin ID 104204

Synopsis

The remote OracleVM host is missing one or more security updates.

Description

The remote OracleVM system is missing necessary patches to address critical security updates :

- add disable monitor to default ntp.conf [CVE-2013-5211]

- fix buffer overflow in datum refclock driver (CVE-2017-6462)

- fix crash with invalid unpeer command (CVE-2017-6463)

- fix potential crash with invalid server command (CVE-2017-6464)

- don't limit rate of packets from sources (CVE-2016-7426)

- don't change interface from received packets (CVE-2016-7429)

- fix calculation of root distance again (CVE-2016-7433)

- require authentication for trap commands (CVE-2016-9310)

- fix crash when reporting peer event to trappers (CVE-2016-9311)

- don't allow spoofed packets to demobilize associations (CVE-2015-7979, CVE-2016-1547)

- don't allow spoofed packet to enable symmetric interleaved mode (CVE-2016-1548)

- check mode of new source in config command (CVE-2016-2518)

- make MAC check resilient against timing attack (CVE-2016-1550)

Solution

Update the affected ntp / ntpdate packages.

See Also

http://www.nessus.org/u?7c1983e3

http://www.nessus.org/u?9454d3fb

Plugin Details

Severity: High

ID: 104204

File Name: oraclevm_OVMSA-2017-0165.nasl

Version: $Revision: 3.2 $

Type: local

Published: 2017/10/27

Modified: 2018/01/29

Dependencies: 12634

Risk Information

Risk Factor: High

CVSSv2

Base Score: 7.1

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

CVSSv3

Base Score: 7.8

Temporal Score: 7.2

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:X

Vulnerability Information

CPE: p-cpe:/a:oracle:vm:ntp, p-cpe:/a:oracle:vm:ntpdate, cpe:/o:oracle:vm_server:3.3, cpe:/o:oracle:vm_server:3.4

Required KB Items: Host/local_checks_enabled, Host/OracleVM/release, Host/OracleVM/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2017/10/26

Reference Information

CVE: CVE-2013-5211, CVE-2015-7979, CVE-2016-1547, CVE-2016-1548, CVE-2016-1550, CVE-2016-2518, CVE-2016-7426, CVE-2016-7429, CVE-2016-7433, CVE-2016-9310, CVE-2016-9311, CVE-2017-6462, CVE-2017-6463, CVE-2017-6464

BID: 64692