FreeBSD : ntp -- control message remote Denial of Service vulnerability (0d0f3050-1f69-11e5-9ba9-d050996490d0)

high Nessus Plugin ID 84482

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

ntp.org reports :

Under limited and specific circumstances an attacker can send a crafted packet to cause a vulnerable ntpd instance to crash. This requires each of the following to be true :

- ntpd set up to allow for remote configuration (not allowed by default), and

- knowledge of the configuration password, and

- access to a computer entrusted to perform remote configuration.

Solution

Update the affected packages.

See Also

http://bugs.ntp.org/show_bug.cgi?id=2853

https://www.kb.cert.org/vuls/id/668167

http://www.nessus.org/u?e1d497be

http://www.nessus.org/u?d5af4da9

Plugin Details

Severity: High

ID: 84482

File Name: freebsd_pkg_0d0f30501f6911e59ba9d050996490d0.nasl

Version: 2.5

Type: local

Published: 7/1/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:ntp, p-cpe:/a:freebsd:freebsd:ntp-devel, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 6/30/2015

Vulnerability Publication Date: 6/29/2015