Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in NTP (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in NTP (Aktualisierung)
ID: USN-3707-2
Distribution: Ubuntu
Plattformen: Ubuntu 12.04 ESM
Datum: Mi, 23. Januar 2019, 19:58
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7428
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7426
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7427
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9310
Applikationen: NTP
Update von: Mehrere Probleme in NTP

Originalnachricht


--===============7671583488616962430==
Content-Type: multipart/signed; micalg="pgp-sha256";
protocol="application/pgp-signature";
boundary="=-cfHhkCWXKd2cIXroeZbE"


--=-cfHhkCWXKd2cIXroeZbE
Content-Type: text/plain; charset="UTF-8
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3707-2
January 23, 2019

ntp vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in NTP.

Software Description:
- ntp: Network Time Protocol daemon and utility programs

Details:

USN-3707-1 and USN-3349-1 fixed several vulnerabilities in NTP. This
update provides the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

Miroslav Lichvar discovered that NTP incorrectly handled certain
spoofed addresses when performing rate limiting. A remote attacker
could possibly use this issue to perform a denial of service.
(CVE-2016-7426)

Matthew Van Gundy discovered that NTP incorrectly handled certain
crafted broadcast mode packets. A remote attacker could possibly use
this issue to perform a denial of service.
(CVE-2016-7427, CVE-2016-7428)

Matthew Van Gundy discovered that NTP incorrectly handled certain
control mode packets. A remote attacker could use this issue to set or
unset traps. (CVE-2016-9310)

Matthew Van Gundy discovered that NTP incorrectly handled the trap
service. A remote attacker could possibly use this issue to cause NTP
to crash, resulting in a denial of service. (CVE-2016-9311)

It was discovered that the NTP legacy DPTS refclock driver incorrectly
handled the /dev/datum device. A local attacker could possibly use
this issue to cause a denial of service. (CVE-2017-6462)

It was discovered that NTP incorrectly handled certain invalid
settings in a :config directive. A remote authenticated user could
possibly use this issue to cause NTP to crash, resulting in a denial
of service. (CVE-2017-6463)

Michael Macnair discovered that NTP incorrectly handled certain
responses. A remote attacker could possibly use this issue to execute
arbitrary code. (CVE-2018-7183)

Miroslav Lichvar discovered that NTP incorrectly handled certain
zero-origin timestamps. A remote attacker could possibly use this
issue to cause a denial of service. (CVE-2018-7185)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
ntp 1:4.2.6.p3+dfsg-1ubuntu3.12

In general, a standard system update will make all the necessary
changes.

References:
https://usn.ubuntu.com/usn/usn-3707-2
https://usn.ubuntu.com/usn/usn-3707-1
CVE-2016-7426, CVE-2016-7427, CVE-2016-7428, CVE-2016-9310,
CVE-2016-9311, CVE-2017-6462, CVE-2017-6463, CVE-2018-7183,
CVE-2018-7185
--=-cfHhkCWXKd2cIXroeZbE
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=Fx5B
-----END PGP SIGNATURE-----

--=-cfHhkCWXKd2cIXroeZbE--



--===============7671583488616962430==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============7671583488616962430==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung