F5 Networks BIG-IP : NTP vulnerability (K17517)

high Nessus Plugin ID 91313

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

Memory leak in the CRYPTO_ASSOC function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (memory consumption). (CVE-2015-7701)

Impact

An attacker could send packets to ntpd that may, after several days of ongoing attack, cause it to run out of memory. There is no control plane exposure in the BIG-IP system when you use a default configuration, and this issue is exposed only when NTP is configured to use the Autokey security protocol.

Solution

Upgrade to one of the non-vulnerable versions listed in the F5 Solution K17517.

See Also

https://support.f5.com/csp/article/K17517

https://www.tenable.com/security/research/tra-2015-04

Plugin Details

Severity: High

ID: 91313

File Name: f5_bigip_SOL17517.nasl

Version: 2.9

Type: local

Published: 5/25/2016

Updated: 6/22/2020

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:f5:big-ip_access_policy_manager, cpe:/a:f5:big-ip_advanced_firewall_manager, cpe:/a:f5:big-ip_application_acceleration_manager, cpe:/a:f5:big-ip_application_security_manager, cpe:/a:f5:big-ip_application_visibility_and_reporting, cpe:/a:f5:big-ip_global_traffic_manager, cpe:/a:f5:big-ip_link_controller, cpe:/a:f5:big-ip_local_traffic_manager, cpe:/a:f5:big-ip_policy_enforcement_manager, cpe:/a:f5:big-ip_wan_optimization_manager, cpe:/a:f5:big-ip_webaccelerator, cpe:/h:f5:big-ip, cpe:/h:f5:big-ip_protocol_security_manager

Required KB Items: Host/local_checks_enabled, Settings/ParanoidReport, Host/BIG-IP/hotfix, Host/BIG-IP/modules, Host/BIG-IP/version

Exploit Ease: No known exploits are available

Patch Publication Date: 11/2/2015

Vulnerability Publication Date: 8/7/2017

Reference Information

CVE: CVE-2015-7701