Bug 910764 (CVE-2014-9295) - VUL-0: CVE-2014-9295: ntp: VU#852879: remote buffer overflow and weak cryptography
Summary: VUL-0: CVE-2014-9295: ntp: VU#852879: remote buffer overflow and weak cryptog...
Status: RESOLVED FIXED
: 912826 (view as bug list)
Alias: CVE-2014-9295
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P2 - High : Critical
Target Milestone: ---
Deadline: 2014-12-24
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard: wasL3:42161 maint:running:60103:criti...
Keywords: DSLA_REQUIRED, DSLA_SOLUTION_PROVIDED
Depends on:
Blocks: 912826
  Show dependency treegraph
 
Reported: 2014-12-19 08:21 UTC by Marcus Meissner
Modified: 2022-01-23 14:37 UTC (History)
24 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---
ydfan: needinfo? (jack.hodge)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2014-12-19 08:21:38 UTC
CRD: 2014.12.18

From CERT

Greetings,

This is to inform you of the imminent release of NTP Stable 4.2.8, an update addressing critical vulnerabilities in ntpd (Network Time Protocol).

The vulnerabilities are planned to be made public when NTP 4.2.8 is released on late Thursday 2014-12-18, or soon thereafter. This is a significant update, please make preparations to update as soon as possible.

After the update is made public, we will publish a Vulnerability Note at the following URL:
  <http://www.kb.cert.org/vuls/id/852879>
Please keep information about the vulnerability confidential until the public release.
Comment 1 Marcus Meissner 2014-12-19 15:47:22 UTC
http://support.ntp.org/bin/view/Main/SecurityNotice

 Buffer overflow in crypto_recv()

    References: Sec 2667 / CVE-2014-9295 / VU#852879
    CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
    Versions: All releases before 4.2.8
    Date Resolved: Stable (4.2.8) 18 Dec 2014
    Summary: When Autokey Authentication is enabled (i.e. the ntp.conf file contains a crypto pw ... directive) a remote attacker can send a carefully crafted packet that can overflow a stack buffer and potentially allow malicious code to be executed with the privilege level of the ntpd process.
    Mitigation:
        Upgrade to 4.2.8, or later, from the NTP Project Download Page or the NTP Public Services Project Download Page
        Disable Autokey Authentication by removing, or commenting out, all configuration directives beginning with the crypto keyword in your ntp.conf file. 
    Credit: This vulnerability was discovered by Stephen Roettger of the Google Security Team. 

Buffer overflow in ctl_putdata()

    References: Sec 2668 / CVE-2014-9295 / VU#852879
    Versions: All NTP4 releases before 4.2.8
    CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
    Date Resolved: Stable (4.2.8) 18 Dec 2014
    Summary: A remote attacker can send a carefully crafted packet that can overflow a stack buffer and potentially allow malicious code to be executed with the privilege level of the ntpd process.
    Mitigation:
        Upgrade to 4.2.8, or later, from the NTP Project Download Page or the NTP Public Services Project Download Page 
    Credit: This vulnerability was discovered by Stephen Roettger of the Google Security Team. 

Buffer overflow in configure()

    References: Sec 2669 / CVE-2014-9295 / VU#852879
    Versions: All NTP4 releases before 4.2.8
    CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
    Date Resolved: Stable (4.2.8) 18 Dec 2014
    Summary: A remote attacker can send a carefully crafted packet that can overflow a stack buffer and potentially allow malicious code to be executed with the privilege level of the ntpd process.
    Mitigation:
        Upgrade to 4.2.8, or later, from the NTP Project Download Page or the NTP Public Services Project Download Page 
    Credit: This vulnerability was discovered by Stephen Roettger of the Google Security Team. 

receive(): missing return on error

    References: Sec 2670 / CVE-2014-9296 / VU#852879
    Versions: All NTP4 releases before 4.2.8
    CVSS: (AV:N/AC:L/Au:N/C:N/I:N/A:P) Base Score: 5.0
    Date Resolved: Stable (4.2.8) 18 Dec 2014
    Summary: Code in ntp_proto.c:receive() is missing a return; in the code path where an error was detected, which meant processing did not stop when a specific rare error occurred. We haven't found a way for this bug to affect system integrity. If there is no way to affect system integrity the base CVSS score for this bug is 0. If there is one avenue through which system integrity can be partially affected, the base score becomes a 5. If system integrity can be partially affected via all three integrity metrics, the CVSS base score become 7.5.
    Mitigation:
        Upgrade to 4.2.8, or later, from the NTP Project Download Page or the NTP Public Services Project Download Page
        or Remove or comment out all configuration directives beginning with the crypto keyword in your ntp.conf file. 
    Credit: This vulnerability was discovered by Stephen Roettger of the Google Security Team.
Comment 4 Swamp Workflow Management 2014-12-19 16:35:12 UTC
An update workflow for this issue was started.
This issue was rated as critical.
Please submit fixed packages until 2014-12-23.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/60086
Comment 5 Alexander Bergmann 2014-12-19 16:53:24 UTC
We need updates for the following SLE channles:

SUSE:SLE-10-SP3:Update:Teradata (xntp)
SUSE:SLE-10-SP4:Update (xntp)

SUSE:SLE-11-SP1:Update (this is the base for SLE-11-SP2 and SLE-11-SP3)
SUSE:SLE-12:Update


And for all 3 openSUSE projects:

openSUSE:12.3
openSUSE:13.1
openSUSE:13.2
Comment 9 Bernhard Wiedemann 2014-12-19 19:00:27 UTC
This is an autogenerated message for OBS integration:
This bug (910764) was mentioned in
https://build.opensuse.org/request/show/265958 13.2+13.1+12.3 / ntp
https://build.opensuse.org/request/show/265959 Factory / ntp
Comment 11 Swamp Workflow Management 2014-12-19 23:04:51 UTC
openSUSE-SU-2014:1670-1: An update that fixes two vulnerabilities is now available.

Category: security (critical)
Bug References: 910764
CVE References: CVE-2014-9295,CVE-2014-9296
Sources used:
openSUSE 13.2 (src):    ntp-4.2.6p5-25.5.1
openSUSE 13.1 (src):    ntp-4.2.6p5-15.13.1
openSUSE 12.3 (src):    ntp-4.2.6p5-9.14.1
Comment 12 Swamp Workflow Management 2014-12-22 11:04:49 UTC
openSUSE-SU-2014:1680-1: An update that fixes two vulnerabilities is now available.

Category: security (critical)
Bug References: 910764
CVE References: CVE-2014-9295,CVE-2014-9296
Sources used:
openSUSE Evergreen 11.4 (src):    ntp-4.2.6p3-6.28.1
Comment 14 Swamp Workflow Management 2014-12-22 14:25:38 UTC
An update workflow for this issue was started.
This issue was rated as critical.
Please submit fixed packages until 2014-12-24.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/60103
Comment 17 Swamp Workflow Management 2014-12-22 20:04:58 UTC
SUSE-SU-2014:1686-1: An update that fixes one vulnerability is now available.

Category: security (critical)
Bug References: 910764
CVE References: CVE-2014-9295
Sources used:
SUSE Linux Enterprise Server 11 SP3 for VMware (src):    ntp-4.2.4p8-1.28.1
SUSE Linux Enterprise Server 11 SP3 (src):    ntp-4.2.4p8-1.28.1
SUSE Linux Enterprise Server 11 SP2 LTSS (src):    ntp-4.2.4p8-1.28.1
SUSE Linux Enterprise Desktop 11 SP3 (src):    ntp-4.2.4p8-1.28.1
Comment 19 Swamp Workflow Management 2014-12-23 17:05:11 UTC
SUSE-SU-2014:1690-1: An update that fixes two vulnerabilities is now available.

Category: security (critical)
Bug References: 910764
CVE References: CVE-2014-9295,CVE-2014-9296
Sources used:
SUSE Linux Enterprise Server 12 (src):    ntp-4.2.6p5-31.1
SUSE Linux Enterprise Desktop 12 (src):    ntp-4.2.6p5-31.1
Comment 23 Swamp Workflow Management 2014-12-24 07:05:46 UTC
SUSE-SU-2014:1686-2: An update that fixes one vulnerability is now available.

Category: security (critical)
Bug References: 910764
CVE References: CVE-2014-9295
Sources used:
SUSE Linux Enterprise Server 10 SP4 LTSS (src):    xntp-4.2.4p3-48.25.1
Comment 24 Marcus Meissner 2014-12-24 08:32:39 UTC
Our updates so far fixed the critical buffer overflow issues.

The other security problems are less severe and will be fixed in a update in new year.
Comment 25 Swamp Workflow Management 2014-12-24 18:04:53 UTC
SUSE-SU-2014:1686-3: An update that fixes one vulnerability is now available.

Category: security (critical)
Bug References: 910764
CVE References: CVE-2014-9295
Sources used:
SUSE Linux Enterprise Server 11 SP1 LTSS (src):    ntp-4.2.4p8-1.28.1
Comment 44 L3 Incident Coordination 2015-01-09 11:16:12 UTC
L3:42168 is closed.
Ya Dan Fan
Comment 48 Forgotten User 6b9Kas5iEc 2015-01-13 06:34:28 UTC
*** Bug 912826 has been marked as a duplicate of this bug. ***
Comment 58 L3 Incident Coordination 2015-01-23 10:02:22 UTC
L3:42169 is closed.
Ya Dan Fan
Comment 62 Marcus Meissner 2015-01-27 11:19:10 UTC
CVE-2014-9296 - the code is different in SLES 11 and older and contains correct error exits. 

So only SLES 12 was affected by CVE-2014-9296 and needed fixes.

I posted a note to support.novell.com/security/cve/CVE-2014-9296.html
Comment 64 Reinhard Max 2015-01-27 14:27:31 UTC
I finally got around to backport the fix for CVE-2014-9294 to SLE-11-SP1, but I have difficulties with the others, e.g. ntp-CVE-2014-9293.patch adds a call to MD5auth_setkey(), which dosen't seem to exist on SLE-11.
Comment 71 Jason Dian 2015-02-11 10:10:17 UTC
 Do we have some impact analyze information for CVE-2014-9293, CVE-2014-9294?Huawei is keep on ask for it. as this two patch still do not release.
Comment 73 Marcus Meissner 2015-02-11 10:20:53 UTC
Another ntp is already in QA that contains fixes.
Comment 74 Jason Dian 2015-02-11 10:27:10 UTC
(In reply to Marcus Meissner from comment #73)
> Another ntp is already in QA that contains fixes.

when will ntp release ? Huawei keep asking me for these pacth.
Comment 76 Johannes Segitz 2015-02-11 10:51:00 UTC
(In reply to Jason Dian from comment #74)
SLE 11 SP3 will be ready today, SLE 12 today or tomorrow.
Comment 78 Reinhard Max 2015-02-11 11:01:44 UTC
(In reply to Johannes Segitz from comment #75)
> Max,

Please use either Reinhard or Mr. Max. ;)

> is there a reason why CVE-2014-9293 and CVE-2014-9294 aren't fixed in
> the xntp submit?

ntp-4.2.4p3 in SLE-10-SP4 is not vulnerable, because it doesn't have the random key generation feature.

And I guess it was an oversight that SLE-10-SP3-teradata contains the newer version 4.2.4p8, which is vulnerable. Will resubmit.
Comment 79 Johannes Segitz 2015-02-11 15:20:24 UTC
(In reply to Reinhard Max from comment #78)
Thanks and sorry for the name confusion, Mr. Max ;)
Comment 80 Jason Dian 2015-02-12 01:45:18 UTC
(In reply to Reinhard Max from comment #78)
> (In reply to Johannes Segitz from comment #75)
> > Max,
> 
> Please use either Reinhard or Mr. Max. ;)
> 
> > is there a reason why CVE-2014-9293 and CVE-2014-9294 aren't fixed in
> > the xntp submit?
> 
> ntp-4.2.4p3 in SLE-10-SP4 is not vulnerable, because it doesn't have the
> random key generation feature.
> 
> And I guess it was an oversight that SLE-10-SP3-teradata contains the newer
> version 4.2.4p8, which is vulnerable. Will resubmit.

is sles10 not affected by  cve-2014-9293 and cve-2014-9294 ?
Comment 81 Swamp Workflow Management 2015-02-12 02:06:12 UTC
SUSE-SU-2015:0259-1: An update that fixes four vulnerabilities is now available.

Category: security (important)
Bug References: 910764,911792
CVE References: CVE-2014-9293,CVE-2014-9294,CVE-2014-9297,CVE-2014-9298
Sources used:
SUSE Linux Enterprise Server 11 SP3 for VMware (src):    ntp-4.2.4p8-1.29.32.1
SUSE Linux Enterprise Server 11 SP3 (src):    ntp-4.2.4p8-1.29.32.1
SUSE Linux Enterprise Desktop 11 SP3 (src):    ntp-4.2.4p8-1.29.32.1
Comment 82 Reinhard Max 2015-02-12 06:59:10 UTC
(In reply to Rui Hui Dian from comment #80)
> (In reply to Reinhard Max from comment #78)
> > (In reply to Johannes Segitz from comment #75)
> > > Max,
> > 
> > Please use either Reinhard or Mr. Max. ;)
> > 
> > > is there a reason why CVE-2014-9293 and CVE-2014-9294 aren't fixed in
> > > the xntp submit?
> > 
> > ntp-4.2.4p3 in SLE-10-SP4 is not vulnerable, because it doesn't have the
> > random key generation feature.
> > 
> > And I guess it was an oversight that SLE-10-SP3-teradata contains the newer
> > version 4.2.4p8, which is vulnerable. Will resubmit.
> 
> is sles10 not affected by  cve-2014-9293 and cve-2014-9294 ?

As I wrote above: SLE-10-SP4 is not affected, SLE-10-SP3-teradata is.
Comment 83 Johannes Segitz 2015-02-12 07:16:50 UTC
(In reply to Reinhard Max from comment #78)
Thanks for the submit, but then I need a separate one for SLE 10 SP4 with only the two other CVEs fixed. Thanks.
Comment 84 Jason Dian 2015-02-12 07:33:53 UTC
(In reply to Reinhard Max from comment #82)
> (In reply to Rui Hui Dian from comment #80)
> > (In reply to Reinhard Max from comment #78)
> > > (In reply to Johannes Segitz from comment #75)
> > > > Max,
> > > 
> > > Please use either Reinhard or Mr. Max. ;)
> > > 
> > > > is there a reason why CVE-2014-9293 and CVE-2014-9294 aren't fixed in
> > > > the xntp submit?
> > > 
> > > ntp-4.2.4p3 in SLE-10-SP4 is not vulnerable, because it doesn't have the
> > > random key generation feature.
> > > 
> > > And I guess it was an oversight that SLE-10-SP3-teradata contains the newer
> > > version 4.2.4p8, which is vulnerable. Will resubmit.
> > 
> > is sles10 not affected by  cve-2014-9293 and cve-2014-9294 ?
> 
> As I wrote above: SLE-10-SP4 is not affected, SLE-10-SP3-teradata is.

thanks, and I also want to know if sles10-sp3, sles10-sp2, and sles10-sp1 are affacted by CVE-2014-9293, and CVE-2014-9294
Comment 85 Reinhard Max 2015-02-12 07:53:19 UTC
(In reply to Johannes Segitz from comment #83)
> Thanks for the submit, but then I need a separate one for SLE 10 SP4 with
> only the two other CVEs fixed. Thanks.

OK, but I can't do that before tomorrow, because I am on vacation today.

(In reply to Jason Dian from comment #84)

> thanks, and I also want to know if sles10-sp3, sles10-sp2, and sles10-sp1
> are affacted by CVE-2014-9293, and CVE-2014-9294

I haven't checked, because to my knowledge they are out of maintenance.

But you can check it yourself: If the (x)ntp version is smaller or equal to SP4 they are not affected, if it is equal or higher than SP3-teradata, they are affected. If it is in between, the code needs to be inspected.
Comment 86 Johannes Segitz 2015-02-12 08:09:48 UTC
(In reply to Reinhard Max from comment #85)
That isn't a problem, QA is busy anyway. Have a nice FTO.
Comment 87 Swamp Workflow Management 2015-02-12 20:05:02 UTC
SUSE-SU-2015:0274-1: An update that fixes four vulnerabilities is now available.

Category: security (important)
Bug References: 910764,911792
CVE References: CVE-2014-9293,CVE-2014-9294,CVE-2014-9297,CVE-2014-9298
Sources used:
SUSE Linux Enterprise Server 12 (src):    ntp-4.2.6p5-37.2
SUSE Linux Enterprise Desktop 12 (src):    ntp-4.2.6p5-37.2
Comment 88 Swamp Workflow Management 2015-02-13 18:05:01 UTC
SUSE-SU-2015:0259-2: An update that fixes four vulnerabilities is now available.

Category: security (important)
Bug References: 910764,911792
CVE References: CVE-2014-9293,CVE-2014-9294,CVE-2014-9297,CVE-2014-9298
Sources used:
SUSE Linux Enterprise Server 11 SP2 LTSS (src):    ntp-4.2.4p8-1.29.32.1
Comment 91 Reinhard Max 2015-02-16 13:06:55 UTC
https://build.suse.de/request/show/51332
Comment 92 Swamp Workflow Management 2015-02-16 18:05:50 UTC
SUSE-SU-2015:0259-3: An update that fixes four vulnerabilities is now available.

Category: security (important)
Bug References: 910764,911792
CVE References: CVE-2014-9293,CVE-2014-9294,CVE-2014-9297,CVE-2014-9298
Sources used:
SUSE Linux Enterprise Server 11 SP1 LTSS (src):    ntp-4.2.4p8-1.29.32.1
Comment 93 L3 Incident Coordination 2015-03-04 08:19:55 UTC
L3:42265 is closed.
Ya Dan Fan
Comment 94 Marcus Meissner 2015-03-17 07:12:35 UTC
all done
Comment 100 L3 Incident Coordination 2015-05-22 08:51:26 UTC
L3 is closed.
Ya Dan Fan