Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

[R3] Tenable Appliance Affected by NTP Vulnerabilities

Medium

Synopsis

The Tenable Appliance ships with the Network Time Protocol (NTP) service. Recently, several vulnerabilities were identified by a third-party and fixed by the vendor. Some of these issues may allow for remote code execution. The issues include:

  • NTP ntpd/ntp_crypto.c crypto_recv() Function Packet Handling Remote Stack Buffer Overflow
  • NTP ntpd/ntp_control.c configure() Function Packet Handling Remote Stack Buffer Overflow
  • NTP ntpd/ntp_control.c ctl_putdata() Function Packet Handling Remote Stack Buffer Overflow
  • NTP ntp-keygen MD5 Key Generation Weak RNG Seed MitM Issue
  • NTP Weak RSA Key Generation Modulus Unspecified Issue
  • NTP Extension Fields Missing vallen Validation Unspecified Issue
  • NTP Unspecified ::1 Spoofing Source IP ACL Bypass
  • NTP ntp_proto.c receive() Function Error Clause Missing return Statement Unspecified Weakness
  • NTP ntpd/ntp_config.c config_auth() Weak Default Key Generation

While the NTP service may allow remote traffic, best practices say that such an appliance should not be Internet accessible. If deployed in accordance with best practices, attacks would have to be conducted from an internal network.

Please note that Tenable strongly recommends that the appliance be installed on a subnet that is not Internet addressable.

Solution

Tenable has updated the Appliance to address these issues. If the Appliance is configured for automatic updating (by default, enabled on version 3.0.0 and later), simply click the Appliance 'update' button on the 'Updates' page. This will automatically download and install the patch. Customers still using an older 2.x.x release are strongly advised to upgrade to the latest version for new features and automatic updating.

This page contains information regarding security vulnerabilities that may impact Tenable's products. This may include issues specific to our software, or due to the use of third-party libraries within our software. Tenable strongly encourages users to ensure that they upgrade or apply relevant patches in a timely manner.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]