Cisco Prime Security Manager Network Time Protocol Daemon (ntpd) Multiple Vulnerabilities (cisco-sa-20141222-ntpd)

High Nessus Plugin ID 81980

Synopsis

The management application running on the remote host is affected by multiple vulnerabilities.

Description

According to its self-reported version number, the version of Cisco Prime Security Manager running on the remote host is prior to 9.3.3.2.
It is, therefore, affected by multiple vulnerabilities in the bundled NTP libraries :

- A security weakness exists due to the config_auth() function improperly generating default keys when no authentication key is defined in the 'ntp.conf' file.
Key size is limited to 31 bits and the insecure ntp_random() function is used, resulting in cryptographically-weak keys with insufficient entropy.
This allows a remote attacker to defeat cryptographic protection mechanisms via a brute-force attack.
(CVE-2014-9293)

- A security weakness exists due the use of a weak seed to prepare a random number generator used to generate symmetric keys. This allows remote attackers to defeat cryptographic protection mechanisms via a brute-force attack. (CVE-2014-9294)

- Multiple stack-based buffer overflows exist due to improperly validated user-supplied input when handling packets in the crypto_recv(), ctl_putdata(), and configure() functions when using autokey authentication.
This allows a remote attacker, via a specially crafted packet, to cause a denial of service condition or execute arbitrary code. (CVE-2014-9295)

- A unspecified vulnerability exists due to missing return statements in the receive() function, resulting in continued processing even when an authentication error is encountered. This allows a remote attacker, via crafted packets, to trigger unintended association changes. (CVE-2014-9296)

Solution

Upgrade to Cisco Prime Security Manager 9.3.3.2. Note that version 9.3.3.2 is scheduled for release on May 15th, 2015.

See Also

http://www.nessus.org/u?292ffa4a

Plugin Details

Severity: High

ID: 81980

File Name: cisco-sa-20141222-ntpd-prsm.nasl

Version: 1.8

Type: remote

Family: CGI abuses

Published: 2015/03/20

Updated: 2018/11/15

Dependencies: 62181

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:prime_security_manager

Required KB Items: installed_sw/Cisco PRSM

Exploit Available: false

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2014/12/19

Reference Information

CVE: CVE-2014-9293, CVE-2014-9294, CVE-2014-9295, CVE-2014-9296

BID: 71757, 71758, 71761, 71762

CERT: 852879

CISCO-BUG-ID: CSCus27226

CISCO-SA: cisco-sa-20141222-ntpd