CVE-2015-1799
Published: 8 April 2015
The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer.
Notes
Author | Note |
---|---|
mdeslaur | we will not be backporting this issue to the codebase in lucid before it goes end-of-life. Marking as ignored. |
Priority
Status
Package | Release | Status |
---|---|---|
ntp Launchpad, Ubuntu, Debian |
upstream |
Released
(4.2.8p2)
|
lucid |
Ignored
|
|
precise |
Released
(1:4.2.6.p3+dfsg-1ubuntu3.4)
|
|
trusty |
Released
(1:4.2.6.p5+dfsg-3ubuntu2.14.04.3)
|
|
utopic |
Released
(1:4.2.6.p5+dfsg-3ubuntu2.14.10.3)
|
|
Patches: upstream: http://bk.ntp.org/ntp-stable/?PAGE=patch&REV=550a80b0iGyIv4t9J1GJ_74V_eEx4A |