2017-07-21 16:29:00 2018-10-30 17:27:37

The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).

Vector

NETWORK

Complexity

LOW

Authentication

NONE

Confidentiality

NONE

Integrity

NONE

Availability

PARTIAL
Suse Linux enterprise software development kit 12 Sp1 (not an official CPE) Suse Linux enterprise software development kit 12 (not an official CPE) Suse Linux enterprise server 12 Sp1 (not an official CPE) Suse Linux enterprise server 11 Sp4 (not an official CPE) Suse Linux enterprise server 11 Sp3 ~~ltss~~~ (not an official CPE) Suse Linux enterprise server 11 Sp2 ~~ltss~~~ (not an official CPE) Suse Linux enterprise desktop 12 Sp1 (not an official CPE) Suse Linux enterprise server 10 Sp4 ~~ltss~~~ (not an official CPE) Suse Linux enterprise desktop 12 (not an official CPE) Redhat Enterprise linux workstation 6.0 (not an official CPE) Redhat Enterprise linux workstation 7.0 (not an official CPE) Redhat Enterprise linux server eus 7.1 (not an official CPE) Redhat Enterprise linux server eus 6.7.z (not an official CPE) Redhat Enterprise linux server 7.0 (not an official CPE) Redhat Enterprise linux server 6.0 (not an official CPE) Redhat Enterprise linux hpc node eus 7.1 (not an official CPE) Redhat Enterprise linux hpc node 7.0 (not an official CPE) Redhat Enterprise linux hpc node 6.0 (not an official CPE) Redhat Enterprise linux desktop 7.0 (not an official CPE) Redhat Enterprise linux desktop 6.0 (not an official CPE) Opensuse Opensuse 13.2 (not an official CPE) Opensuse Leap 42.1 (not an official CPE) Fedora 22 Debian Linux 8.0 (Jessie) Fedora 21 Canonical Ubuntu linux 15.10 (not an official CPE) Debian Linux 7.0 Canonical Ubuntu Linux 15.04 Canonical Ubuntu Linux 14.04 LTS (Long-Term Support) Canonical Ubuntu Linux 12.04 LTS Suse Manager 2.1 (not an official CPE) Suse Manager proxy 2.1 (not an official CPE) Suse Openstack cloud 5 (not an official CPE) Suse Suse linux enterprise server 12 (not an official CPE)
Advisory Patch Confirmed Link
https://www.oracle.com/technetwork/topics/security/linux...
https://www.oracle.com/technetwork/topics/security/bulle...
https://www.cs.bu.edu/~goldbe/NTPattack.html
FreeBSD-SA-16:02
https://www.ibm.com/support/home/docdisplay?lndocid=migr...
https://www-01.ibm.com/support/docview.wss?uid=swg219835...
https://www-01.ibm.com/support/docview.wss?uid=swg219835...
https://www-01.ibm.com/support/docview.wss?uid=swg219793...
https://www-01.ibm.com/support/docview.wss?uid=swg219806...
https://www-01.ibm.com/support/docview.wss?uid=ssg1S1005...
https://www-01.ibm.com/support/docview.wss?uid=nas8N1021...
https://www-01.ibm.com/support/docview.wss?uid=isg3T1023...
https://www-01.ibm.com/support/docview.wss?uid=isg3T1024...
https://security.netapp.com/advisory/ntap-20171004-0001/
https://support.citrix.com/article/CTX220112
https://ics-cert.us-cert.gov/advisories/ICSA-15-356-01
https://bto.bluecoat.com/security-advisory/sa113
https://bugzilla.redhat.com/show_bug.cgi?id=1271076
USN-2783-1
77312
1034670
DSA-3388
http://www.oracle.com/technetwork/security-advisory/cpuj...
http://support.ntp.org/bin/view/Main/SecurityNotice#Janu...
http://support.ntp.org/bin/view/Main/NtpBug2956
SUSE-SU:2016:2094
openSUSE-SU:2016:1423
RHSA-2015:1930
[slackware-security] 20160223 ntp (SSA:2016-054-04)
SUSE-SU:2016:1912
SUSE-SU:2016:1311
SUSE-SU:2016:1247
openSUSE-SU:2016:1292
SUSE-SU:2016:1177
FEDORA-2016-34bc10a2c8
SUSE-SU:2016:1175
FEDORA-2015-f5f5ec7b6b
FEDORA-2015-77bfbc1bcd
http://aix.software.ibm.com/aix/efixes/security/ntp_advi...