FreeBSD : ntpd DRDoS / Amplification Attack using ntpdc monlist command (3d95c9a7-7d5c-11e3-a8c1-206a8a720317)

Medium Nessus Plugin ID 71960


The remote FreeBSD host is missing a security-related update.

Description reports :

Unrestricted access to the monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013

Use noquery to your default restrictions to block all status queries.

Use disable monitor to disable the ``ntpdc -c monlist'' command while still allowing other status queries.


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 71960

File Name: freebsd_pkg_3d95c9a77d5c11e3a8c1206a8a720317.nasl

Version: $Revision: 1.7 $

Type: local

Published: 2014/01/15

Modified: 2016/05/09

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:ntp, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/01/14

Vulnerability Publication Date: 2014/01/01

Reference Information

CVE: CVE-2013-5211

BID: 64692

OSVDB: 101576

FreeBSD: SA-14:02.ntpd