OracleVM 2.2 : ntp (OVMSA-2015-0002)

High Nessus Plugin ID 80395

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 6.7

Synopsis

The remote OracleVM host is missing a security update.

Description

The remote OracleVM system is missing necessary patches to address critical security updates :

- don't generate weak control key for resolver (CVE-2014-9293)

- don't generate weak MD5 keys in ntp-keygen (CVE-2014-9294)

- fix buffer overflows via specially-crafted packets (CVE-2014-9295)

- increase memlock limit again (#1035198)

- allow selection of cipher for private key files (#741573)

- revert init script priority (#470945, #689636)

- drop tentative patch (#489835)

- move restorecon call to %posttrans

- call restorecon on ntpd and ntpdate on start (#470945)

- don't crash with more than 512 local addresses (#661934)

- add -I option (#528799)

- fix -L option to not require argument (#460434)

- move ntpd and ntpdate to /sbin and start earlier on boot (#470945, #689636)

- increase memlock limit (#575874)

- ignore tentative addresses (#489835)

- print synchronization distance instead of dispersion in ntpstat (#679034)

- fix typos in ntpq and ntp-keygen man pages (#664524, #664525)

- clarify ntpd -q description (#591838)

- don't verify ntp.conf (#481151)

- replace Prereq tag

- fix DoS with mode 7 packets (#532640, CVE-2009-3563)

- compile with -fno-strict-aliasing

- fix buffer overflow when parsing Autokey association message (#500784, CVE-2009-1252)

- fix buffer overflow in ntpq (#500784, CVE-2009-0159)

- fix check for malformed signatures (#479699, CVE-2009-0021)

Solution

Update the affected ntp package.

See Also

http://www.nessus.org/u?cb11e689

Plugin Details

Severity: High

ID: 80395

File Name: oraclevm_OVMSA-2015-0002.nasl

Version: 1.19

Type: local

Published: 2015/01/07

Updated: 2019/09/27

Dependencies: 12634

Risk Information

Risk Factor: High

VPR Score: 6.7

CVSS v2.0

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:oracle:vm:ntp, cpe:/o:oracle:vm_server:2.2

Required KB Items: Host/local_checks_enabled, Host/OracleVM/release, Host/OracleVM/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2015/01/06

Vulnerability Publication Date: 2009/01/07

Reference Information

CVE: CVE-2009-0021, CVE-2009-0159, CVE-2009-1252, CVE-2009-3563, CVE-2014-9293, CVE-2014-9294, CVE-2014-9295

BID: 33150, 34481, 35017, 37255, 71757, 71761, 71762

CWE: 119, 287