Mehrere Probleme in NTP (Aktualisierung)
ID: | USN-3707-2 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 12.04 ESM |
Datum: | Mi, 23. Januar 2019, 19:58 |
Referenzen: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7428
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9311 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7426 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7185 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7183 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7427 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6463 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6462 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9310 |
Applikationen: | NTP |
Update von: | Mehrere Probleme in NTP |
Originalnachricht |
|
--===============7671583488616962430== Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="=-cfHhkCWXKd2cIXroeZbE" --=-cfHhkCWXKd2cIXroeZbE Content-Type: text/plain; charset="UTF-8 Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-3707-2 January 23, 2019 ntp vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 ESM Summary: Several security issues were fixed in NTP. Software Description: - ntp: Network Time Protocol daemon and utility programs Details: USN-3707-1 and USN-3349-1 fixed several vulnerabilities in NTP. This update provides the corresponding update for Ubuntu 12.04 ESM. Original advisory details: Miroslav Lichvar discovered that NTP incorrectly handled certain spoofed addresses when performing rate limiting. A remote attacker could possibly use this issue to perform a denial of service. (CVE-2016-7426) Matthew Van Gundy discovered that NTP incorrectly handled certain crafted broadcast mode packets. A remote attacker could possibly use this issue to perform a denial of service. (CVE-2016-7427, CVE-2016-7428) Matthew Van Gundy discovered that NTP incorrectly handled certain control mode packets. A remote attacker could use this issue to set or unset traps. (CVE-2016-9310) Matthew Van Gundy discovered that NTP incorrectly handled the trap service. A remote attacker could possibly use this issue to cause NTP to crash, resulting in a denial of service. (CVE-2016-9311) It was discovered that the NTP legacy DPTS refclock driver incorrectly handled the /dev/datum device. A local attacker could possibly use this issue to cause a denial of service. (CVE-2017-6462) It was discovered that NTP incorrectly handled certain invalid settings in a :config directive. A remote authenticated user could possibly use this issue to cause NTP to crash, resulting in a denial of service. (CVE-2017-6463) Michael Macnair discovered that NTP incorrectly handled certain responses. A remote attacker could possibly use this issue to execute arbitrary code. (CVE-2018-7183) Miroslav Lichvar discovered that NTP incorrectly handled certain zero-origin timestamps. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2018-7185) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 ESM: ntp 1:4.2.6.p3+dfsg-1ubuntu3.12 In general, a standard system update will make all the necessary changes. References: https://usn.ubuntu.com/usn/usn-3707-2 https://usn.ubuntu.com/usn/usn-3707-1 CVE-2016-7426, CVE-2016-7427, CVE-2016-7428, CVE-2016-9310, CVE-2016-9311, CVE-2017-6462, CVE-2017-6463, CVE-2018-7183, CVE-2018-7185 --=-cfHhkCWXKd2cIXroeZbE Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAABCAAGBQJcSHnoAAoJEEW851uECx9p37wQAJfuw5DipbWafpPPMPWpsFFa RKbin/GXIAAI1mtKdd1VhGcCYgw6bK/HXAL+HoD9VZu0GnZmoXt42vRd7nnHWn8l tswaCRuIVD7/aZ9GCUT4h5E3KbjfCaTgSbm/t6mbeMMEVqIG2yDw7gShzDiRdDLj k+SzmSjqhiS3Tu4SXiLeZC3FNOO/jjuQ/Jdbzm2/JYImo9D+2PCcnpk04Wkq3Bs7 wCb/q8cRIbj2VXAWJe5WKZGu/Hiw/rygki+YE0RZU+pGK86ZUQmWDnuXeSt/0bd1 Bmjyk9qoGKRXwEIqJpxa7415yfRtGaMQdRbG75X0Ln/z8MUPm900gt/E6sxsHyZx NWyxgCVq/IPZ4v/KxNaL2+bjV3Hwpq2b8tDd2VNWppgdsJwuSGojyuhfCo+PsSpW ERnH0HkvZ+0fc7aVyuC+lxYteEQhpS+TXLe1b1a5/yKjYHkNivfRm0aWHRMVyODu UGikG9zMvUTUF9MZPVroEyfKxAfJnFbwIJl9yAswHWL+Fj6ZFLy4hc7t6tZqAV2e JZeaEy3WhkqfUJPV7HRBmkWV+k8RDb6tUWjJ5npm7v8tmT6UgyhMgUZZXtWVJCx8 erfLBjYhUykx/KSLL/gPeo5GflRcGL9tfvWlhOcdQhHiWY9PB/dnTD940qtDVawp RpphSQ5010j8gDK6zymN =Fx5B -----END PGP SIGNATURE----- --=-cfHhkCWXKd2cIXroeZbE-- --===============7671583488616962430== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK --===============7671583488616962430==-- |