MGASA-2016-0219

Source
https://advisories.mageia.org/MGASA-2016-0219.html
Import Source
https://advisories.mageia.org/MGASA-2016-0219.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2016-0219
Related
Published
2016-06-07T21:39:50Z
Modified
2016-06-07T21:34:13Z
Summary
Updated ntp packages fix security vulnerability
Details

ntpq and ntpdc disclose the origin timestamp to unauthenticated clients, which may allow an attacker to impersonate a legitimate peer (CVE-2015-8139).

An attacker who is able to spoof packets with correct origin timestamps from enough servers before the expected response packets arrive at the target machine can affect some peer variables and, for example, cause a false leap indication to be set (CVE-2016-4954).

An attacker who is able to spoof a packet with a correct origin timestamp before the expected response packet arrives at the target machine can send a CRYPTO_NAK or a bad MAC and cause the association's peer variables to be cleared. If this can be done often enough, it will prevent that association from working (CVE-2016-4955).

The fix for CVE-2016-1548 does not cover broadcast associations, so broadcast clients can be triggered to flip into interleave mode (CVE-2016-4956).

References
Credits

Affected packages

Mageia:5 / ntp

Package

Name
ntp
Purl
pkg:rpm/mageia/ntp?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.2.6p5-24.6.mga5

Ecosystem specific

{
    "section": "core"
}