ID CVE-2009-3563
Summary ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.
References
Vulnerable Configurations
  • NTP 4.0.96
    cpe:2.3:a:ntp:ntp:4.0.96
  • NTP 4.0.95
    cpe:2.3:a:ntp:ntp:4.0.95
  • NTP 4.0.98
    cpe:2.3:a:ntp:ntp:4.0.98
  • NTP 4.0.97
    cpe:2.3:a:ntp:ntp:4.0.97
  • NTP 4.1.0
    cpe:2.3:a:ntp:ntp:4.1.0
  • NTP 4.0.99
    cpe:2.3:a:ntp:ntp:4.0.99
  • NTP 4.0.72
    cpe:2.3:a:ntp:ntp:4.0.72
  • NTP 4.1.2
    cpe:2.3:a:ntp:ntp:4.1.2
  • NTP 4.0.90
    cpe:2.3:a:ntp:ntp:4.0.90
  • NTP 4.0.73
    cpe:2.3:a:ntp:ntp:4.0.73
  • NTP 4.0.92
    cpe:2.3:a:ntp:ntp:4.0.92
  • NTP 4.0.91
    cpe:2.3:a:ntp:ntp:4.0.91
  • NTP 4.0.94
    cpe:2.3:a:ntp:ntp:4.0.94
  • NTP 4.0.93
    cpe:2.3:a:ntp:ntp:4.0.93
  • cpe:2.3:a:ntp:ntp:4.2.2p1
    cpe:2.3:a:ntp:ntp:4.2.2p1
  • cpe:2.3:a:ntp:ntp:4.2.2p2
    cpe:2.3:a:ntp:ntp:4.2.2p2
  • cpe:2.3:a:ntp:ntp:4.2.2p3
    cpe:2.3:a:ntp:ntp:4.2.2p3
  • NTP 4.2.2
    cpe:2.3:a:ntp:ntp:4.2.2
  • NTP 4.2.0
    cpe:2.3:a:ntp:ntp:4.2.0
  • cpe:2.3:a:ntp:ntp:4.2.2p4
    cpe:2.3:a:ntp:ntp:4.2.2p4
  • cpe:2.3:a:ntp:ntp:4.2.5
    cpe:2.3:a:ntp:ntp:4.2.5
CVSS
Base: 6.4 (as of 10-12-2009 - 09:28)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL PARTIAL
metasploit via4
description This module exploits a denial of service vulnerability within the NTP (network time protocol) demon. By sending a single packet to a vulnerable ntpd server (Victim A), spoofed from the IP address of another vulnerable ntpd server (Victim B), both victims will enter an infinite response loop. Note, unless you control the spoofed source host or the real remote host(s), you will not be able to halt the DoS condition once begun!
id MSF:AUXILIARY/DOS/NTP/NTPD_RESERVED_DOS
last seen 2019-03-28
modified 2017-07-24
published 2009-12-13
reliability Normal
reporter Rapid7
source https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/dos/ntp/ntpd_reserved_dos.rb
title NTP.org ntpd Reserved Mode Denial of Service
nessus via4
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2009-13090.NASL
    description This update fixes possible DoS with mode 7 packets. (CVE-2009-3563) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-21
    plugin id 43124
    published 2009-12-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=43124
    title Fedora 11 : ntp-4.2.4p7-3.fc11 (2009-13090)
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_X86_127725-02.NASL
    description SunOS 5.10_x86: xntpd patch. Date this patch was last updated by Sun : Apr/08/10
    last seen 2018-10-31
    modified 2018-10-29
    plugin id 107962
    published 2018-03-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107962
    title Solaris 10 (x86) : 127725-02
  • NASL family HP-UX Local Security Checks
    NASL id HPUX_PHNE_41177.NASL
    description s700_800 11.31 NTP timeservices upgrade plus utilities : A potential security vulnerability has been identified with HP-UX running XNTP. The vulnerability could be exploited remotely create a Denial of Service (DoS).
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 53269
    published 2011-04-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53269
    title HP-UX PHNE_41177 : HP-UX Running XNTP, Remote Denial of Service (DoS) (HPSBUX02639 SSRT100293 rev.1)
  • NASL family HP-UX Local Security Checks
    NASL id HPUX_PHNE_41908.NASL
    description s700_800 11.23 NTP timeservices upgrade plus utilities : A potential security vulnerability has been identified with HP-UX running XNTP. The vulnerability could be exploited remotely create a Denial of Service (DoS).
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 53271
    published 2011-04-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53271
    title HP-UX PHNE_41908 : HP-UX Running XNTP, Remote Denial of Service (DoS) (HPSBUX02639 SSRT100293 rev.1)
  • NASL family HP-UX Local Security Checks
    NASL id HPUX_PHNE_41907.NASL
    description s700_800 11.11 NTP timeservices upgrade plus utilities : A potential security vulnerability has been identified with HP-UX running XNTP. The vulnerability could be exploited remotely create a Denial of Service (DoS).
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 53270
    published 2011-04-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53270
    title HP-UX PHNE_41907 : HP-UX Running XNTP, Remote Denial of Service (DoS) (HPSBUX02639 SSRT100293 rev.1)
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_X86_143728-01.NASL
    description SunOS 5.10_x86: SunFreeware ntp source pat. Date this patch was last updated by Sun : Feb/26/10
    last seen 2018-11-22
    modified 2018-11-21
    plugin id 108050
    published 2018-03-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108050
    title Solaris 10 (x86) : 143728-01
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_127724-02.NASL
    description SunOS 5.10: xntpd patch. Date this patch was last updated by Sun : Apr/08/10
    last seen 2018-10-27
    modified 2018-10-26
    plugin id 107463
    published 2018-03-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107463
    title Solaris 10 (sparc) : 127724-02
  • NASL family VMware ESX Local Security Checks
    NASL id VMWARE_VMSA-2010-0004_REMOTE.NASL
    description The remote VMware ESX host is missing a security-related patch. It is, therefore, affected by multiple vulnerabilities, including remote code execution vulnerabilities, in several third-party components and libraries : - bind - expat - glib2 - Kernel - newt - nfs-utils - NTP - OpenSSH - OpenSSL
    last seen 2019-02-21
    modified 2018-08-06
    plugin id 89737
    published 2016-03-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=89737
    title VMware ESX Third-Party Libraries Multiple Vulnerabilities (VMSA-2010-0004) (remote check)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201001-01.NASL
    description The remote host is affected by the vulnerability described in GLSA-201001-01 (NTP: Denial of Service) Robin Park and Dmitri Vinokurov discovered that ntp_request.c in ntpd does not handle MODE_PRIVATE packets correctly, causing a continuous exchange of MODE_PRIVATE error responses between two NTP daemons or causing high CPU load on a single host. Impact : A remote, unauthenticated attacker could send a specially crafted MODE_PRIVATE packet, allowing for a Denial of Service condition (CPU and bandwidth consumption). Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 44890
    published 2010-02-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=44890
    title GLSA-201001-01 : NTP: Denial of Service
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2009-343-01.NASL
    description New ntp packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 12.0, 12.1, 12.2, 13.0, and -current to fix a security issue. If a spoofed mode 7 packet is sent to a vulnerable NTP daemon it may cause CPU and/or disk space exhaustion, resulting in a denial of service.
    last seen 2019-02-21
    modified 2018-06-27
    plugin id 43102
    published 2009-12-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=43102
    title Slackware 10.0 / 10.1 / 10.2 / 11.0 / 12.0 / 12.1 / 12.2 / 13.0 / 8.1 / 9.0 / 9.1 / current : ntp (SSA:2009-343-01)
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_143725-01.NASL
    description SunOS 5.10: SunFreeware ntp patch. Date this patch was last updated by Sun : Feb/26/10
    last seen 2018-10-27
    modified 2018-10-26
    plugin id 107549
    published 2018-03-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107549
    title Solaris 10 (sparc) : 143725-01
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_1_NTP-091221.NASL
    description By sending specially crafted NTP packets attackers could make ntpd flood it's log file with error messages or even run into an endless loop (CVE-2009-3563).
    last seen 2019-02-21
    modified 2015-01-13
    plugin id 43870
    published 2010-01-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=43870
    title openSUSE Security Update : ntp (ntp-1728)
  • NASL family OracleVM Local Security Checks
    NASL id ORACLEVM_OVMSA-2015-0002.NASL
    description The remote OracleVM system is missing necessary patches to address critical security updates : - don't generate weak control key for resolver (CVE-2014-9293) - don't generate weak MD5 keys in ntp-keygen (CVE-2014-9294) - fix buffer overflows via specially-crafted packets (CVE-2014-9295) - increase memlock limit again (#1035198) - allow selection of cipher for private key files (#741573) - revert init script priority (#470945, #689636) - drop tentative patch (#489835) - move restorecon call to %posttrans - call restorecon on ntpd and ntpdate on start (#470945) - don't crash with more than 512 local addresses (#661934) - add -I option (#528799) - fix -L option to not require argument (#460434) - move ntpd and ntpdate to /sbin and start earlier on boot (#470945, #689636) - increase memlock limit (#575874) - ignore tentative addresses (#489835) - print synchronization distance instead of dispersion in ntpstat (#679034) - fix typos in ntpq and ntp-keygen man pages (#664524, #664525) - clarify ntpd -q description (#591838) - don't verify ntp.conf (#481151) - replace Prereq tag - fix DoS with mode 7 packets (#532640, CVE-2009-3563) - compile with -fno-strict-aliasing - fix buffer overflow when parsing Autokey association message (#500784, CVE-2009-1252) - fix buffer overflow in ntpq (#500784, CVE-2009-0159) - fix check for malformed signatures (#479699, CVE-2009-0021)
    last seen 2019-02-21
    modified 2018-07-24
    plugin id 80395
    published 2015-01-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=80395
    title OracleVM 2.2 : ntp (OVMSA-2015-0002)
  • NASL family AIX Local Security Checks
    NASL id AIX_IZ71614.NASL
    description 'NTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control utility. In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while routine NTP time transfers use modes 1 through 5. Upon receipt of an incorrect mode 7 request or a mode 7 error response from an address that is not listed in a 'restrict ... noquery' or 'restrict ... ignore' segment, ntpd will reply with a mode 7 error response and log a message.' 'If an attacker spoofs the source address of ntpd host A in a mode 7 response packet sent to ntpd host B, both A and B will continuously send each other error responses, for as long as those packets get through.' 'If an attacker spoofs an address of ntpd host A in a mode 7 response packet sent to ntpd host A, then host A will respond to itself endlessly, consuming CPU and logging excessively.'.
    last seen 2019-02-21
    modified 2015-01-14
    plugin id 63806
    published 2013-01-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=63806
    title AIX 6.1 TL 3 : xntpd (IZ71614)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2009-1648.NASL
    description An updated ntp package that fixes a security issue is now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Network Time Protocol (NTP) is used to synchronize a computer's time with a referenced time source. Robin Park and Dmitri Vinokurov discovered a flaw in the way ntpd handled certain malformed NTP packets. ntpd logged information about all such packets and replied with an NTP packet that was treated as malformed when received by another ntpd. A remote attacker could use this flaw to create an NTP packet reply loop between two ntpd servers via a malformed packet with a spoofed source IP address and port, causing ntpd on those servers to use excessive amounts of CPU time and fill disk space with log messages. (CVE-2009-3563) All ntp users are advised to upgrade to this updated package, which contains a backported patch to resolve this issue. After installing the update, the ntpd daemon will restart automatically.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 43071
    published 2009-12-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=43071
    title CentOS 4 / 5 : ntp (CESA-2009:1648)
  • NASL family AIX Local Security Checks
    NASL id AIX_U832257.NASL
    description The remote host is missing AIX PTF U832257, which is related to the security of the package bos.net.tcp.client. NTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control utility. In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while routine NTP time transfers use modes 1 through 5. Upon receipt of an incorrect mode 7 request or a mode 7 error response from an address that is not listed in a 'restrict ... noquery' or 'restrict ... ignore' segment, ntpd will reply with a mode 7 error response and log a message. If an attacker spoofs the source address of ntpd host A in a mode 7 response packet sent to ntpd host B, both A and B will continuously send each other error responses, for as long as those packets get through. If an attacker spoofs an address of ntpd host A in a mode 7 response packet sent to ntpd host A, then host A will respond to itself endlessly, consuming CPU and logging excessively.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 46470
    published 2010-05-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=46470
    title AIX 5.3 TL 8 : bos.net.tcp.client (U832257)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_XNTP-6718.NASL
    description By sending specially crafted NTP packets attackers could make ntpd flood it's log file with error messages or even run into an endless loop. (CVE-2009-3563)
    last seen 2019-02-21
    modified 2015-01-13
    plugin id 49932
    published 2010-10-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49932
    title SuSE 10 Security Update : xntp (ZYPP Patch Number 6718)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2009-1648.NASL
    description An updated ntp package that fixes a security issue is now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Network Time Protocol (NTP) is used to synchronize a computer's time with a referenced time source. Robin Park and Dmitri Vinokurov discovered a flaw in the way ntpd handled certain malformed NTP packets. ntpd logged information about all such packets and replied with an NTP packet that was treated as malformed when received by another ntpd. A remote attacker could use this flaw to create an NTP packet reply loop between two ntpd servers via a malformed packet with a spoofed source IP address and port, causing ntpd on those servers to use excessive amounts of CPU time and fill disk space with log messages. (CVE-2009-3563) All ntp users are advised to upgrade to this updated package, which contains a backported patch to resolve this issue. After installing the update, the ntpd daemon will restart automatically.
    last seen 2019-02-21
    modified 2018-11-27
    plugin id 43080
    published 2009-12-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=43080
    title RHEL 4 / 5 : ntp (RHSA-2009:1648)
  • NASL family AIX Local Security Checks
    NASL id AIX_IZ68659.NASL
    description 'NTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control utility. In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while routine NTP time transfers use modes 1 through 5. Upon receipt of an incorrect mode 7 request or a mode 7 error response from an address that is not listed in a 'restrict ... noquery' or 'restrict ... ignore' segment, ntpd will reply with a mode 7 error response and log a message.' 'If an attacker spoofs the source address of ntpd host A in a mode 7 response packet sent to ntpd host B, both A and B will continuously send each other error responses, for as long as those packets get through.' 'If an attacker spoofs an address of ntpd host A in a mode 7 response packet sent to ntpd host A, then host A will respond to itself endlessly, consuming CPU and logging excessively.'.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 63798
    published 2013-01-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=63798
    title AIX 5.3 TL 8 : xntpd (IZ68659)
  • NASL family SuSE Local Security Checks
    NASL id SUSE9_12559.NASL
    description By sending specially crafted NTP packets attackers could make ntpd flood its log file with error messages or even run into an endless loop (CVE-2009-3563). This has been fixed.
    last seen 2019-02-21
    modified 2015-01-13
    plugin id 43364
    published 2009-12-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=43364
    title SuSE9 Security Update : xntp (YOU Patch Number 12559)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_NTP-091211.NASL
    description By sending specially crafted NTP packets attackers could make ntpd flood it's log file with error messages or even run into an endless loop. (CVE-2009-3563)
    last seen 2019-02-21
    modified 2015-01-13
    plugin id 43873
    published 2010-01-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=43873
    title SuSE 11 Security Update : ntp (SAT Patch Number 1677)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2009-1648.NASL
    description From Red Hat Security Advisory 2009:1648 : An updated ntp package that fixes a security issue is now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Network Time Protocol (NTP) is used to synchronize a computer's time with a referenced time source. Robin Park and Dmitri Vinokurov discovered a flaw in the way ntpd handled certain malformed NTP packets. ntpd logged information about all such packets and replied with an NTP packet that was treated as malformed when received by another ntpd. A remote attacker could use this flaw to create an NTP packet reply loop between two ntpd servers via a malformed packet with a spoofed source IP address and port, causing ntpd on those servers to use excessive amounts of CPU time and fill disk space with log messages. (CVE-2009-3563) All ntp users are advised to upgrade to this updated package, which contains a backported patch to resolve this issue. After installing the update, the ntpd daemon will restart automatically.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 67969
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=67969
    title Oracle Linux 4 / 5 : ntp (ELSA-2009-1648)
  • NASL family VMware ESX Local Security Checks
    NASL id VMWARE_VMSA-2010-0009_REMOTE.NASL
    description The remote VMware ESX / ESXi host is missing a security-related patch. It is, therefore, affected by multiple vulnerabilities, including remote code execution vulnerabilities, in several components and third-party libraries : - libpng - VMnc Codec - vmrun - VMware Remote Console (VMrc) - VMware Tools - vmware-authd
    last seen 2019-02-21
    modified 2018-08-06
    plugin id 89740
    published 2016-03-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=89740
    title VMware ESX / ESXi Third-Party Libraries and Components (VMSA-2010-0009) (remote check)
  • NASL family Misc.
    NASL id NTPD_MODE7_PING_PONG_DOS.NASL
    description The version of ntpd running on the remote host has a denial of service vulnerability. It responds to mode 7 error packets with its own mode 7 error packets. A remote attacker could exploit this by sending a mode 7 error response with a spoofed IP header, setting the source and destination IP addresses to the IP address of the target. This would cause ntpd to respond to itself endlessly, consuming excessive amounts of CPU, resulting in a denial of service.
    last seen 2019-02-21
    modified 2018-07-16
    plugin id 43156
    published 2009-12-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=43156
    title NTP ntpd Mode 7 Error Response Packet Loop Remote DoS
  • NASL family AIX Local Security Checks
    NASL id AIX_IZ71093.NASL
    description 'NTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control utility. In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while routine NTP time transfers use modes 1 through 5. Upon receipt of an incorrect mode 7 request or a mode 7 error response from an address that is not listed in a 'restrict ... noquery' or 'restrict ... ignore' segment, ntpd will reply with a mode 7 error response and log a message.' 'If an attacker spoofs the source address of ntpd host A in a mode 7 response packet sent to ntpd host B, both A and B will continuously send each other error responses, for as long as those packets get through.' 'If an attacker spoofs an address of ntpd host A in a mode 7 response packet sent to ntpd host A, then host A will respond to itself endlessly, consuming CPU and logging excessively.'.
    last seen 2019-02-21
    modified 2015-01-14
    plugin id 63801
    published 2013-01-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=63801
    title AIX 5.3 TL 9 : xntpd (IZ71093)
  • NASL family AIX Local Security Checks
    NASL id AIX_IZ71613.NASL
    description 'NTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control utility. In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while routine NTP time transfers use modes 1 through 5. Upon receipt of an incorrect mode 7 request or a mode 7 error response from an address that is not listed in a 'restrict ... noquery' or 'restrict ... ignore' segment, ntpd will reply with a mode 7 error response and log a message.' 'If an attacker spoofs the source address of ntpd host A in a mode 7 response packet sent to ntpd host B, both A and B will continuously send each other error responses, for as long as those packets get through.' 'If an attacker spoofs an address of ntpd host A in a mode 7 response packet sent to ntpd host A, then host A will respond to itself endlessly, consuming CPU and logging excessively.'.
    last seen 2019-02-21
    modified 2015-01-14
    plugin id 63805
    published 2013-01-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=63805
    title AIX 6.1 TL 2 : xntpd (IZ71613)
  • NASL family AIX Local Security Checks
    NASL id AIX_IZ71608.NASL
    description 'NTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control utility. In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while routine NTP time transfers use modes 1 through 5. Upon receipt of an incorrect mode 7 request or a mode 7 error response from an address that is not listed in a 'restrict ... noquery' or 'restrict ... ignore' segment, ntpd will reply with a mode 7 error response and log a message.' 'If an attacker spoofs the source address of ntpd host A in a mode 7 response packet sent to ntpd host B, both A and B will continuously send each other error responses, for as long as those packets get through.' 'If an attacker spoofs an address of ntpd host A in a mode 7 response packet sent to ntpd host A, then host A will respond to itself endlessly, consuming CPU and logging excessively.'.
    last seen 2019-02-21
    modified 2015-01-14
    plugin id 63802
    published 2013-01-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=63802
    title AIX 5.3 TL 10 : xntpd (IZ71608)
  • NASL family VMware ESX Local Security Checks
    NASL id VMWARE_VMSA-2010-0004.NASL
    description a. vMA and Service Console update for newt to 0.52.2-12.el5_4.1 Newt is a programming library for color text mode, widget based user interfaces. Newt can be used to add stacked windows, entry widgets, checkboxes, radio buttons, labels, plain text fields, scrollbars, etc., to text mode user interfaces. A heap-based buffer overflow flaw was found in the way newt processes content that is to be displayed in a text dialog box. A local attacker could issue a specially crafted text dialog box display request (direct or via a custom application), leading to a denial of service (application crash) or, potentially, arbitrary code execution with the privileges of the user running the application using the newt library. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2009-2905 to this issue. b. vMA and Service Console update for vMA package nfs-utils to 1.0.9-42.el5 The nfs-utils package provides a daemon for the kernel NFS server and related tools. It was discovered that nfs-utils did not use tcp_wrappers correctly. Certain hosts access rules defined in '/etc/hosts.allow' and '/etc/hosts.deny' may not have been honored, possibly allowing remote attackers to bypass intended access restrictions. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2008-4552 to this issue. c. vMA and Service Console package glib2 updated to 2.12.3-4.el5_3.1 GLib is the low-level core library that forms the basis for projects such as GTK+ and GNOME. It provides data structure handling for C, portability wrappers, and interfaces for such runtime functionality as an event loop, threads, dynamic loading, and an object system. Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow context-dependent attackers to execute arbitrary code via a long string that is converted either from or to a base64 representation. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2008-4316 to this issue. d. vMA and Service Console update for openssl to 0.9.8e-12.el5 SSL is a toolkit implementing SSL v2/v3 and TLS protocols with full- strength cryptography world-wide. Multiple denial of service flaws were discovered in OpenSSL's DTLS implementation. A remote attacker could use these flaws to cause a DTLS server to use excessive amounts of memory, or crash on an invalid memory access or NULL pointer dereference. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the names CVE-2009-1377, CVE-2009-1378, CVE-2009-1379, CVE-2009-1386, CVE-2009-1387 to these issues. An input validation flaw was found in the handling of the BMPString and UniversalString ASN1 string types in OpenSSL's ASN1_STRING_print_ex() function. An attacker could use this flaw to create a specially crafted X.509 certificate that could cause applications using the affected function to crash when printing certificate contents. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2009-0590 to this issue. e. vMA and Service Console package bind updated to 9.3.6-4.P1.el5_4.1 It was discovered that BIND was incorrectly caching responses without performing proper DNSSEC validation, when those responses were received during the resolution of a recursive client query that requested DNSSEC records but indicated that checking should be disabled. A remote attacker could use this flaw to bypass the DNSSEC validation check and perform a cache poisoning attack if the target BIND server was receiving such client queries. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2009-4022 to this issue. f. vMA and Service Console package expat updated to 1.95.8-8.3.el5_4.2. Two buffer over-read flaws were found in the way Expat handled malformed UTF-8 sequences when processing XML files. A specially- crafted XML file could cause applications using Expat to fail while parsing the file. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the names CVE-2009-3560 and CVE-2009-3720 to these issues. g. vMA and Service Console package openssh update to 4.3p2-36.el5_4.2 A Red Hat specific patch used in the openssh packages as shipped in Red Hat Enterprise Linux 5.4 (RHSA-2009:1287) loosened certain ownership requirements for directories used as arguments for the ChrootDirectory configuration options. A malicious user that also has or previously had non-chroot shell access to a system could possibly use this flaw to escalate their privileges and run commands as any system user. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2009-2904 to this issue. h. vMA and Service Console package ntp updated to ntp-4.2.2p1-9.el5_4.1.i386.rpm A flaw was discovered in the way ntpd handled certain malformed NTP packets. ntpd logged information about all such packets and replied with an NTP packet that was treated as malformed when received by another ntpd. A remote attacker could use this flaw to create an NTP packet reply loop between two ntpd servers through a malformed packet with a spoofed source IP address and port, causing ntpd on those servers to use excessive amounts of CPU time and fill disk space with log messages. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2009-3563 to this issue. i. vMA update for package kernel to 2.6.18-164.9.1.el5 Updated vMA package kernel addresses the security issues listed below. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2009-2849 to the security issue fixed in kernel 2.6.18-128.2.1 The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2009-2695, CVE-2009-2908, CVE-2009-3228, CVE-2009-3286, CVE-2009-3547, CVE-2009-3613 to the security issues fixed in kernel 2.6.18-128.6.1 The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2009-3612, CVE-2009-3620, CVE-2009-3621, CVE-2009-3726 to the security issues fixed in kernel 2.6.18-128.9.1 j. vMA 4.0 updates for the packages kpartx, libvolume-id, device-mapper-multipath, fipscheck, dbus, dbus-libs, and ed kpartx updated to 0.4.7-23.el5_3.4, libvolume-id updated to 095-14.20.el5 device-mapper-multipath package updated to 0.4.7-23.el5_3.4, fipscheck updated to 1.0.3-1.el5, dbus updated to 1.1.2-12.el5, dbus-libs updated to 1.1.2-12.el5, and ed package updated to 0.2-39.el5_2. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the names CVE-2008-3916, CVE-2009-1189 and CVE-2009-0115 to these issues.
    last seen 2019-02-21
    modified 2018-08-06
    plugin id 44993
    published 2010-03-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=44993
    title VMSA-2010-0004 : ESX Service Console and vMA third-party updates
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_2_NTP-091215.NASL
    description By sending specially crafted NTP packets attackers could make ntpd flood it's log file with error messages or even run into an endless loop (CVE-2009-3563).
    last seen 2019-02-21
    modified 2015-01-13
    plugin id 43871
    published 2010-01-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=43871
    title openSUSE Security Update : ntp (ntp-1728)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_0_NTP-091211.NASL
    description By sending specially crafted NTP packets attackers could make ntpd flood it's log file with error messages or even run into an endless loop (CVE-2009-3563).
    last seen 2019-02-21
    modified 2015-01-13
    plugin id 43869
    published 2010-01-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=43869
    title openSUSE Security Update : ntp (ntp-1728)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-1948.NASL
    description Robin Park and Dmitri Vinokurov discovered that the daemon component of the ntp package, a reference implementation of the NTP protocol, is not properly reacting to certain incoming packets. An unexpected NTP mode 7 packet (MODE_PRIVATE) with spoofed IP data can lead ntpd to reply with a mode 7 response to the spoofed address. This may result in the service playing packet ping-pong with other ntp servers or even itself which causes CPU usage and excessive disk use due to logging. An attacker can use this to conduct denial of service attacks.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 44813
    published 2010-02-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=44813
    title Debian DSA-1948-1 : ntp - denial of service
  • NASL family VMware ESX Local Security Checks
    NASL id VMWARE_VMSA-2010-0009.NASL
    description a. Service Console update for COS kernel Updated COS package 'kernel' addresses the security issues that are fixed through versions 2.6.18-164.11.1. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2009-2695, CVE-2009-2908, CVE-2009-3228, CVE-2009-3286, CVE-2009-3547, CVE-2009-3613 to the security issues fixed in kernel 2.6.18-164.6.1 The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2009-3612, CVE-2009-3620, CVE-2009-3621, CVE-2009-3726 to the security issues fixed in kernel 2.6.18-164.9.1. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2007-4567, CVE-2009-4536, CVE-2009-4537, CVE-2009-4538 to the security issues fixed in kernel 2.6.18-164.10.1 The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2006-6304, CVE-2009-2910, CVE-2009-3080, CVE-2009-3556, CVE-2009-3889, CVE-2009-3939, CVE-2009-4020, CVE-2009-4021, CVE-2009-4138, CVE-2009-4141, and CVE-2009-4272 to the security issues fixed in kernel 2.6.18-164.11.1. b. ESXi userworld update for ntp The Network Time Protocol (NTP) is used to synchronize the time of a computer client or server to another server or reference time source. A vulnerability in ntpd could allow a remote attacker to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2009-3563 to this issue. c. Service Console package openssl updated to 0.9.8e-12.el5_4.1 OpenSSL is a toolkit implementing SSL v2/v3 and TLS protocols with full-strength cryptography world-wide. A memory leak in the zlib could allow a remote attacker to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to the CRYPTO_cleanup_all_ex_data function. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2009-4355 to this issue. A vulnerability was discovered which may allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2009-2409 to this issue. This update also includes security fixes that were first addressed in version openssl-0.9.8e-12.el5.i386.rpm. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the names CVE-2009-0590, CVE-2009-1377, CVE-2009-1378, CVE-2009-1379, CVE-2009-1386 and CVE-2009-1387 to these issues. d. Service Console update for krb5 to 1.6.1-36.el5_4.1 and pam_krb5 to 2.2.14-15. Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. Multiple integer underflows in the AES and RC4 functionality in the crypto library could allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by providing ciphertext with a length that is too short to be valid. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2009-4212 to this issue. The service console package for pam_krb5 is updated to version pam_krb5-2.2.14-15. This update fixes a flaw found in pam_krb5. In some non-default configurations (specifically, where pam_krb5 would be the first module to prompt for a password), a remote attacker could use this flaw to recognize valid usernames, which would aid a dictionary-based password guess attack. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2009-1384 to this issue. e. Service Console package bind updated to 9.3.6-4.P1.el5_4.2 BIND (Berkeley Internet Name Daemon) is by far the most widely used Domain Name System (DNS) software on the Internet. A vulnerability was discovered which could allow remote attacker to add the Authenticated Data (AD) flag to a forged NXDOMAIN response for an existing domain. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2010-0097 to this issue. A vulnerability was discovered which could allow remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains CNAME or DNAME records, which do not have the intended validation before caching. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2010-0290 to this issue. A vulnerability was found in the way that bind handles out-of- bailiwick data accompanying a secure response without re-fetching from the original source, which could allow remote attackers to have an unspecified impact via a crafted response. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2010-0382 to this issue. NOTE: ESX does not use the BIND name service daemon by default. f. Service Console package gcc updated to 3.2.3-60 The GNU Compiler Collection includes front ends for C, C++, Objective-C, Fortran, Java, and Ada, as well as libraries for these languages GNU Libtool's ltdl.c attempts to open .la library files in the current working directory. This could allow a local user to gain privileges via a Trojan horse file. The GNU C Compiler collection (gcc) provided in ESX contains a statically linked version of the vulnerable code, and is being replaced. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2009-3736 to this issue. g. Service Console package gzip update to 1.3.3-15.rhel3 gzip is a software application used for file compression An integer underflow in gzip's unlzw function on 64-bit platforms may allow a remote attacker to trigger an array index error leading to a denial of service (application crash) or possibly execute arbitrary code via a crafted LZW compressed file. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2010-0001 to this issue. h. Service Console package sudo updated to 1.6.9p17-6.el5_4 Sudo (su 'do') allows a system administrator to delegate authority to give certain users (or groups of users) the ability to run some (or all) commands as root or another user while providing an audit trail of the commands and their arguments. When a pseudo-command is enabled, sudo permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2010-0426 to this issue. When the runas_default option is used, sudo does not properly set group memberships, which allows local users to gain privileges via a sudo command. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2010-0427 to this issue.
    last seen 2019-02-21
    modified 2018-08-06
    plugin id 46765
    published 2010-06-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=46765
    title VMSA-2010-0009 : ESXi ntp and ESX Service Console third-party updates
  • NASL family OracleVM Local Security Checks
    NASL id ORACLEVM_OVMSA-2015-0001.NASL
    description The remote OracleVM system is missing necessary patches to address critical security updates : - Remove default ntp servers in ntp.conf [bug 14342986] - don't generate weak control key for resolver (CVE-2014-9293) - don't generate weak MD5 keys in ntp-keygen (CVE-2014-9294) - fix buffer overflows via specially-crafted packets (CVE-2014-9295) - increase memlock limit again (#1035198) - allow selection of cipher for private key files (#741573) - revert init script priority (#470945, #689636) - drop tentative patch (#489835) - move restorecon call to %posttrans - call restorecon on ntpd and ntpdate on start (#470945) - don't crash with more than 512 local addresses (#661934) - add -I option (#528799) - fix -L option to not require argument (#460434) - move ntpd and ntpdate to /sbin and start earlier on boot (#470945, #689636) - increase memlock limit (#575874) - ignore tentative addresses (#489835) - print synchronization distance instead of dispersion in ntpstat (#679034) - fix typos in ntpq and ntp-keygen man pages (#664524, #664525) - clarify ntpd -q description (#591838) - don't verify ntp.conf (#481151) - replace Prereq tag - fix DoS with mode 7 packets (#532640, CVE-2009-3563) - compile with -fno-strict-aliasing - fix buffer overflow when parsing Autokey association message (#500784, CVE-2009-1252) - fix buffer overflow in ntpq (#500784, CVE-2009-0159) - fix check for malformed signatures (#479699, CVE-2009-0021)
    last seen 2019-02-21
    modified 2018-07-24
    plugin id 80394
    published 2015-01-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=80394
    title OracleVM 3.2 : ntp (OVMSA-2015-0001)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_XNTP-6719.NASL
    description By sending specially crafted NTP packets attackers could make ntpd flood it's log file with error messages or even run into an endless loop. (CVE-2009-3563)
    last seen 2019-02-21
    modified 2015-01-13
    plugin id 43365
    published 2009-12-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=43365
    title SuSE 10 Security Update : xntp (ZYPP Patch Number 6719)
  • NASL family HP-UX Local Security Checks
    NASL id HPUX_PHNE_42470.NASL
    description s700_800 11.31 cumulative ARPA Transport patch : A potential security vulnerability has been identified with HP-UX running XNTP. The vulnerability could be exploited remotely to create a Denial of Service (DoS) or execute arbitrary code.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 66504
    published 2013-05-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=66504
    title HP-UX PHNE_42470 : s700_800 11.31 cumulative ARPA Transport patch
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2009-1651.NASL
    description From Red Hat Security Advisory 2009:1651 : An updated ntp package that fixes two security issues is now available for Red Hat Enterprise Linux 3. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Network Time Protocol (NTP) is used to synchronize a computer's time with a referenced time source. Robin Park and Dmitri Vinokurov discovered a flaw in the way ntpd handled certain malformed NTP packets. ntpd logged information about all such packets and replied with an NTP packet that was treated as malformed when received by another ntpd. A remote attacker could use this flaw to create an NTP packet reply loop between two ntpd servers via a malformed packet with a spoofed source IP address and port, causing ntpd on those servers to use excessive amounts of CPU time and fill disk space with log messages. (CVE-2009-3563) A buffer overflow flaw was found in the ntpq diagnostic command. A malicious, remote server could send a specially crafted reply to an ntpq request that could crash ntpq or, potentially, execute arbitrary code with the privileges of the user running the ntpq command. (CVE-2009-0159) All ntp users are advised to upgrade to this updated package, which contains backported patches to resolve these issues. After installing the update, the ntpd daemon will restart automatically.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 67970
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=67970
    title Oracle Linux 3 : ntp (ELSA-2009-1651)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2009-1651.NASL
    description An updated ntp package that fixes two security issues is now available for Red Hat Enterprise Linux 3. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Network Time Protocol (NTP) is used to synchronize a computer's time with a referenced time source. Robin Park and Dmitri Vinokurov discovered a flaw in the way ntpd handled certain malformed NTP packets. ntpd logged information about all such packets and replied with an NTP packet that was treated as malformed when received by another ntpd. A remote attacker could use this flaw to create an NTP packet reply loop between two ntpd servers via a malformed packet with a spoofed source IP address and port, causing ntpd on those servers to use excessive amounts of CPU time and fill disk space with log messages. (CVE-2009-3563) A buffer overflow flaw was found in the ntpq diagnostic command. A malicious, remote server could send a specially crafted reply to an ntpq request that could crash ntpq or, potentially, execute arbitrary code with the privileges of the user running the ntpq command. (CVE-2009-0159) All ntp users are advised to upgrade to this updated package, which contains backported patches to resolve these issues. After installing the update, the ntpd daemon will restart automatically.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 43072
    published 2009-12-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=43072
    title CentOS 3 : ntp (CESA-2009:1651)
  • NASL family F5 Networks Local Security Checks
    NASL id F5_BIGIP_SOL10905.NASL
    description An ntpd vulnerability inNTPallows a remote attacker to cause a denial of service (DOS).
    last seen 2019-02-21
    modified 2019-01-04
    plugin id 88429
    published 2016-01-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=88429
    title F5 Networks BIG-IP : NTP vulnerability (SOL10905)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2009-13121.NASL
    description This update fixes possible DoS with mode 7 packets. (CVE-2009-3563) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-21
    plugin id 43126
    published 2009-12-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=43126
    title Fedora 10 : ntp-4.2.4p7-2.fc10 (2009-13121)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2009-328.NASL
    description A vulnerability has been found and corrected in ntp : Robin Park and Dmitri Vinokurov discovered a flaw in the way ntpd handled certain malformed NTP packets. ntpd logged information about all such packets and replied with an NTP packet that was treated as malformed when received by another ntpd. A remote attacker could use this flaw to create an NTP packet reply loop between two ntpd servers via a malformed packet with a spoofed source IP address and port, causing ntpd on those servers to use excessive amounts of CPU time and fill disk space with log messages (CVE-2009-3563). This update provides a solution to this vulnerability.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 43077
    published 2009-12-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=43077
    title Mandriva Linux Security Advisory : ntp (MDVSA-2009:328)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20091208_NTP_ON_SL3_X.NASL
    description CVE-2009-0159 ntp: buffer overflow in ntpq CVE-2009-3563 ntpd: DoS with mode 7 packets (VU#568372) Robin Park and Dmitri Vinokurov discovered a flaw in the way ntpd handled certain malformed NTP packets. ntpd logged information about all such packets and replied with an NTP packet that was treated as malformed when received by another ntpd. A remote attacker could use this flaw to create an NTP packet reply loop between two ntpd servers via a malformed packet with a spoofed source IP address and port, causing ntpd on those servers to use excessive amounts of CPU time and fill disk space with log messages. (CVE-2009-3563) A buffer overflow flaw was found in the ntpq diagnostic command. A malicious, remote server could send a specially crafted reply to an ntpq request that could crash ntpq or, potentially, execute arbitrary code with the privileges of the user running the ntpq command. (CVE-2009-0159) SL3 Only After installing the update, the ntpd daemon will restart automatically.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 60703
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=60703
    title Scientific Linux Security Update : ntp on SL3.x, SL4.x, SL5.x i386/x86_64
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-867-1.NASL
    description Robin Park and Dmitri Vinokurov discovered a logic error in ntpd. A remote attacker could send a crafted NTP mode 7 packet with a spoofed IP address of an affected server and cause a denial of service via CPU and disk resource consumption. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 43087
    published 2009-12-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=43087
    title Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : ntp vulnerability (USN-867-1)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2009-13046.NASL
    description This update fixes possible DoS with mode 7 packets. (CVE-2009-3563) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-21
    plugin id 43120
    published 2009-12-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=43120
    title Fedora 12 : ntp-4.2.4p8-1.fc12 (2009-13046)
  • NASL family AIX Local Security Checks
    NASL id AIX_IZ71611.NASL
    description 'NTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control utility. In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while routine NTP time transfers use modes 1 through 5. Upon receipt of an incorrect mode 7 request or a mode 7 error response from an address that is not listed in a 'restrict ... noquery' or 'restrict ... ignore' segment, ntpd will reply with a mode 7 error response and log a message.' 'If an attacker spoofs the source address of ntpd host A in a mode 7 response packet sent to ntpd host B, both A and B will continuously send each other error responses, for as long as those packets get through.' 'If an attacker spoofs an address of ntpd host A in a mode 7 response packet sent to ntpd host A, then host A will respond to itself endlessly, consuming CPU and logging excessively.'.
    last seen 2019-02-21
    modified 2015-01-14
    plugin id 63804
    published 2013-01-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=63804
    title AIX 6.1 TL 1 : xntpd (IZ71611)
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_143727-01.NASL
    description SunOS 5.10: SunFreeware ntp source patch. Date this patch was last updated by Sun : Feb/26/10
    last seen 2018-11-22
    modified 2018-11-21
    plugin id 107556
    published 2018-03-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107556
    title Solaris 10 (sparc) : 143727-01
  • NASL family AIX Local Security Checks
    NASL id AIX_IZ71610.NASL
    description 'NTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control utility. In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while routine NTP time transfers use modes 1 through 5. Upon receipt of an incorrect mode 7 request or a mode 7 error response from an address that is not listed in a 'restrict ... noquery' or 'restrict ... ignore' segment, ntpd will reply with a mode 7 error response and log a message.' 'If an attacker spoofs the source address of ntpd host A in a mode 7 response packet sent to ntpd host B, both A and B will continuously send each other error responses, for as long as those packets get through.' 'If an attacker spoofs an address of ntpd host A in a mode 7 response packet sent to ntpd host A, then host A will respond to itself endlessly, consuming CPU and logging excessively.'.
    last seen 2019-02-21
    modified 2015-01-14
    plugin id 63803
    published 2013-01-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=63803
    title AIX 5.3 TL 11 : xntpd (IZ71610)
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_X86_143726-01.NASL
    description SunOS 5.10_x86: SunFreeware ntp patch. Date this patch was last updated by Sun : Feb/26/10
    last seen 2018-10-31
    modified 2018-10-29
    plugin id 108043
    published 2018-03-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108043
    title Solaris 10 (x86) : 143726-01
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2009-1651.NASL
    description An updated ntp package that fixes two security issues is now available for Red Hat Enterprise Linux 3. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Network Time Protocol (NTP) is used to synchronize a computer's time with a referenced time source. Robin Park and Dmitri Vinokurov discovered a flaw in the way ntpd handled certain malformed NTP packets. ntpd logged information about all such packets and replied with an NTP packet that was treated as malformed when received by another ntpd. A remote attacker could use this flaw to create an NTP packet reply loop between two ntpd servers via a malformed packet with a spoofed source IP address and port, causing ntpd on those servers to use excessive amounts of CPU time and fill disk space with log messages. (CVE-2009-3563) A buffer overflow flaw was found in the ntpq diagnostic command. A malicious, remote server could send a specially crafted reply to an ntpq request that could crash ntpq or, potentially, execute arbitrary code with the privileges of the user running the ntpq command. (CVE-2009-0159) All ntp users are advised to upgrade to this updated package, which contains backported patches to resolve these issues. After installing the update, the ntpd daemon will restart automatically.
    last seen 2019-02-21
    modified 2018-11-27
    plugin id 43081
    published 2009-12-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=43081
    title RHEL 3 : ntp (RHSA-2009:1651)
  • NASL family AIX Local Security Checks
    NASL id AIX_IZ71071.NASL
    description 'NTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control utility. In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while routine NTP time transfers use modes 1 through 5. Upon receipt of an incorrect mode 7 request or a mode 7 error response from an address that is not listed in a 'restrict ... noquery' or 'restrict ... ignore' segment, ntpd will reply with a mode 7 error response and log a message.' 'If an attacker spoofs the source address of ntpd host A in a mode 7 response packet sent to ntpd host B, both A and B will continuously send each other error responses, for as long as those packets get through.' 'If an attacker spoofs an address of ntpd host A in a mode 7 response packet sent to ntpd host A, then host A will respond to itself endlessly, consuming CPU and logging excessively.'.
    last seen 2019-02-21
    modified 2015-01-14
    plugin id 63800
    published 2013-01-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=63800
    title AIX 6.1 TL 4 : xntpd (IZ71071)
  • NASL family OracleVM Local Security Checks
    NASL id ORACLEVM_OVMSA-2009-0036.NASL
    description The remote OracleVM system is missing necessary patches to address critical security updates : - fix DoS with mode 7 packets (#532639, CVE-2009-3563) - compile with -fno-strict-aliasing
    last seen 2019-02-21
    modified 2018-07-24
    plugin id 79471
    published 2014-11-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=79471
    title OracleVM 2.2 : ntp (OVMSA-2009-0036)
oval via4
  • accepted 2013-04-29T04:12:29.559-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 3
      oval oval:org.mitre.oval:def:11782
    • comment CentOS Linux 3.x
      oval oval:org.mitre.oval:def:16651
    • comment The operating system installed on the system is Red Hat Enterprise Linux 4
      oval oval:org.mitre.oval:def:11831
    • comment CentOS Linux 4.x
      oval oval:org.mitre.oval:def:16636
    • comment Oracle Linux 4.x
      oval oval:org.mitre.oval:def:15990
    • comment The operating system installed on the system is Red Hat Enterprise Linux 5
      oval oval:org.mitre.oval:def:11414
    • comment The operating system installed on the system is CentOS Linux 5.x
      oval oval:org.mitre.oval:def:15802
    • comment Oracle Linux 5.x
      oval oval:org.mitre.oval:def:15459
    description ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.
    family unix
    id oval:org.mitre.oval:def:11225
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.
    version 24
  • accepted 2011-01-10T04:00:11.431-05:00
    class vulnerability
    contributors
    name Yamini Mohan R
    organization Hewlett-Packard
    definition_extensions
    • comment IBM AIX 5300-08 is installed
      oval oval:org.mitre.oval:def:5293
    • comment IBM AIX 5300-09 is installed
      oval oval:org.mitre.oval:def:6306
    • comment IBM AIX 6100-01 is installed
      oval oval:org.mitre.oval:def:5959
    • comment IBM AIX 6100-02 is installed
      oval oval:org.mitre.oval:def:5685
    • comment IBM AIX 6100-03 is installed
      oval oval:org.mitre.oval:def:6736
    • comment IBM AIX 6100-04 is installed
      oval oval:org.mitre.oval:def:7373
    description ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.
    family unix
    id oval:org.mitre.oval:def:12141
    status accepted
    submitted 2010-11-26T12:23:50.000-05:00
    title AIX xntpd denial-of-service vulnerability
    version 42
  • accepted 2015-04-20T04:01:12.142-04:00
    class vulnerability
    contributors
    • name Ganesh Manal
      organization Hewlett-Packard
    • name Prashant Kumar
      organization Hewlett-Packard
    • name Mike Cokus
      organization The MITRE Corporation
    description ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.
    family unix
    id oval:org.mitre.oval:def:19376
    status accepted
    submitted 2013-11-22T11:43:28.000-05:00
    title HP-UX Running XNTP, Remote Denial of Service (DoS) and Execution of Arbitrary Code
    version 42
  • accepted 2014-01-20T04:01:31.665-05:00
    class vulnerability
    contributors
    • name J. Daniel Brown
      organization DTCC
    • name Chris Coffin
      organization The MITRE Corporation
    definition_extensions
    comment VMware ESX Server 4.0 is installed
    oval oval:org.mitre.oval:def:6293
    description ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.
    family unix
    id oval:org.mitre.oval:def:7076
    status accepted
    submitted 2010-06-01T17:30:00.000-05:00
    title NTP mode 7 MODE_PRIVATE Packet Remote Denial of Service Vulnerability
    version 8
redhat via4
advisories
  • bugzilla
    id 531213
    title CVE-2009-3563 ntpd: DoS with mode 7 packets (VU#568372)
    oval
    OR
    • AND
      • comment Red Hat Enterprise Linux 4 is installed
        oval oval:com.redhat.rhba:tst:20070304001
      • comment ntp is earlier than 0:4.2.0.a.20040617-8.el4_8.1
        oval oval:com.redhat.rhsa:tst:20091648002
      • comment ntp is signed with Red Hat master key
        oval oval:com.redhat.rhsa:tst:20090046003
    • AND
      • comment Red Hat Enterprise Linux 5 is installed
        oval oval:com.redhat.rhba:tst:20070331001
      • comment ntp is earlier than 0:4.2.2p1-9.el5_4.1
        oval oval:com.redhat.rhsa:tst:20091648005
      • comment ntp is signed with Red Hat redhatrelease key
        oval oval:com.redhat.rhsa:tst:20090046006
    rhsa
    id RHSA-2009:1648
    released 2009-12-08
    severity Moderate
    title RHSA-2009:1648: ntp security update (Moderate)
  • bugzilla
    id 531213
    title CVE-2009-3563 ntpd: DoS with mode 7 packets (VU#568372)
    oval
    AND
    • comment Red Hat Enterprise Linux 3 is installed
      oval oval:com.redhat.rhba:tst:20070026001
    • comment ntp is earlier than 0:4.1.2-6.el3
      oval oval:com.redhat.rhsa:tst:20091651002
    • comment ntp is signed with Red Hat master key
      oval oval:com.redhat.rhsa:tst:20090046003
    rhsa
    id RHSA-2009:1651
    released 2009-12-08
    severity Moderate
    title RHSA-2009:1651: ntp security update (Moderate)
  • rhsa
    id RHSA-2010:0095
rpms
  • ntp-0:4.2.0.a.20040617-8.el4_8.1
  • ntp-0:4.2.2p1-9.el5_4.1
  • ntp-0:4.1.2-6.el3
refmap via4
aixapar
  • IZ68659
  • IZ71047
bid 37255
cert-vn VU#568372
confirm
debian DSA-1948
fedora
  • FEDORA-2009-13090
  • FEDORA-2009-13121
hp
  • HPSBUX02639
  • HPSBUX02859
  • SSRT100293
  • SSRT101144
mlist
  • [announce] 20091208 NTP 4.2.4p8 Released
  • [security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates
netbsd NetBSD-SA2010-005
sectrack 1023298
secunia
  • 37629
  • 37922
  • 38764
  • 38794
  • 38832
  • 38834
  • 39593
sunalert 1021781
vupen
  • ADV-2010-0510
  • ADV-2010-0528
  • ADV-2010-0993
Last major update 07-12-2016 - 22:01
Published 09-12-2009 - 13:30
Last modified 18-09-2017 - 21:29
Back to Top