Bugzilla – Bug 982066
VUL-0: CVE-2016-4954: ntp: Processing spoofed server packets
Last modified: 2016-08-18 15:52:34 UTC
bugbot adjusting priority
CRD: 2016-06-02
http://support.ntp.org/bin/view/Main/NtpBug3044 NTP Bug 3044 Processing spoofed server packets Date Resolved: 02 June 2016; Dev (4.3.93) 02 June 2016 References: Sec 3044 / CVE-2016-4954 / VU#321640 Affects: ntp-4, up to but not including ntp-4.2.8p8, and ntp-4.3.0 up to, but not including ntp-4.3.93. CVSS2: LOW 2.6 (AV:N/AC:H/Au:N/C:N/I:N/A:P) CVSS3: LOW 3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Summary: An attacker who is able to spoof packets with correct origin timestamps from enough servers before the expected response packets arrive at the target machine can affect some peer variables and, for example, cause a false leap indication to be set. Mitigation: Implement BCP-38. Upgrade to 4.2.8p8, or later, from the NTP Project Download Page or the NTP Public Services Project Download Page Properly monitor your ntpd instances. Credit: This weakness was discovered by Jakub Prokes of Red Hat.
This is an autogenerated message for OBS integration: This bug (982066) was mentioned in https://build.opensuse.org/request/show/400418 13.2 / ntp
This is an autogenerated message for OBS integration: This bug (982066) was mentioned in https://build.opensuse.org/request/show/400540 Factory / ntp
SUSE-SU-2016:1563-1: An update that solves 5 vulnerabilities and has four fixes is now available. Category: security (important) Bug References: 979302,979981,981422,982056,982064,982065,982066,982067,982068 CVE References: CVE-2016-4953,CVE-2016-4954,CVE-2016-4955,CVE-2016-4956,CVE-2016-4957 Sources used: SUSE Linux Enterprise Server 12-SP1 (src): ntp-4.2.8p8-14.1 SUSE Linux Enterprise Desktop 12-SP1 (src): ntp-4.2.8p8-14.1
SUSE-SU-2016:1568-1: An update that solves 17 vulnerabilities and has two fixes is now available. Category: security (important) Bug References: 957226,962960,977450,977451,977452,977455,977457,977458,977459,977461,977464,979302,979981,981422,982064,982065,982066,982067,982068 CVE References: CVE-2015-7704,CVE-2015-7705,CVE-2015-7974,CVE-2016-1547,CVE-2016-1548,CVE-2016-1549,CVE-2016-1550,CVE-2016-1551,CVE-2016-2516,CVE-2016-2517,CVE-2016-2518,CVE-2016-2519,CVE-2016-4953,CVE-2016-4954,CVE-2016-4955,CVE-2016-4956,CVE-2016-4957 Sources used: SUSE Linux Enterprise Server 12 (src): ntp-4.2.8p8-46.8.1 SUSE Linux Enterprise Desktop 12 (src): ntp-4.2.8p8-46.8.1
An update workflow for this issue was started. This issue was rated as important. Please submit fixed packages until 2016-06-21. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/62822
openSUSE-SU-2016:1583-1: An update that solves 5 vulnerabilities and has four fixes is now available. Category: security (important) Bug References: 979302,979981,981422,982056,982064,982065,982066,982067,982068 CVE References: CVE-2016-4953,CVE-2016-4954,CVE-2016-4955,CVE-2016-4956,CVE-2016-4957 Sources used: openSUSE 13.2 (src): ntp-4.2.8p8-25.18.1
SUSE-SU-2016:1584-1: An update that solves 5 vulnerabilities and has three fixes is now available. Category: security (important) Bug References: 979302,981422,982056,982064,982065,982066,982067,982068 CVE References: CVE-2016-4953,CVE-2016-4954,CVE-2016-4955,CVE-2016-4956,CVE-2016-4957 Sources used: SUSE Linux Enterprise Server 11-SP4 (src): ntp-4.2.8p8-14.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): ntp-4.2.8p8-14.1
SUSE-SU-2016:1602-1: An update that solves 5 vulnerabilities and has three fixes is now available. Category: security (important) Bug References: 979302,981422,982056,982064,982065,982066,982067,982068 CVE References: CVE-2016-4953,CVE-2016-4954,CVE-2016-4955,CVE-2016-4956,CVE-2016-4957 Sources used: SUSE OpenStack Cloud 5 (src): ntp-4.2.8p8-47.3 SUSE Manager Proxy 2.1 (src): ntp-4.2.8p8-47.3 SUSE Manager 2.1 (src): ntp-4.2.8p8-47.3 SUSE Linux Enterprise Server 11-SP3-LTSS (src): ntp-4.2.8p8-47.3 SUSE Linux Enterprise Server 11-SP2-LTSS (src): ntp-4.2.8p8-47.3 SUSE Linux Enterprise Debuginfo 11-SP3 (src): ntp-4.2.8p8-47.3 SUSE Linux Enterprise Debuginfo 11-SP2 (src): ntp-4.2.8p8-47.3
openSUSE-SU-2016:1636-1: An update that solves 5 vulnerabilities and has four fixes is now available. Category: security (important) Bug References: 979302,979981,981422,982056,982064,982065,982066,982067,982068 CVE References: CVE-2016-4953,CVE-2016-4954,CVE-2016-4955,CVE-2016-4956,CVE-2016-4957 Sources used: openSUSE Leap 42.1 (src): ntp-4.2.8p8-24.1
SUSE-SU-2016:1912-1: An update that solves 43 vulnerabilities and has 9 fixes is now available. Category: security (important) Bug References: 782060,784760,905885,910063,916617,920183,920238,920893,920895,920905,924202,926510,936327,943218,943221,944300,951351,951559,951629,952611,957226,962318,962784,962802,962960,962966,962970,962988,962995,963000,963002,975496,977450,977451,977452,977455,977457,977458,977459,977461,977464,979302,981422,982056,982064,982065,982066,982067,982068,988417,988558,988565 CVE References: CVE-2015-1798,CVE-2015-1799,CVE-2015-5194,CVE-2015-5300,CVE-2015-7691,CVE-2015-7692,CVE-2015-7701,CVE-2015-7702,CVE-2015-7703,CVE-2015-7704,CVE-2015-7705,CVE-2015-7848,CVE-2015-7849,CVE-2015-7850,CVE-2015-7851,CVE-2015-7852,CVE-2015-7853,CVE-2015-7854,CVE-2015-7855,CVE-2015-7871,CVE-2015-7973,CVE-2015-7974,CVE-2015-7975,CVE-2015-7976,CVE-2015-7977,CVE-2015-7978,CVE-2015-7979,CVE-2015-8138,CVE-2015-8158,CVE-2016-1547,CVE-2016-1548,CVE-2016-1549,CVE-2016-1550,CVE-2016-1551,CVE-2016-2516,CVE-2016-2517,CVE-2016-2518,CVE-2016-2519,CVE-2016-4953,CVE-2016-4954,CVE-2016-4955,CVE-2016-4956,CVE-2016-4957 Sources used: SUSE Linux Enterprise Server 10 SP4 LTSS (src): ntp-4.2.8p8-0.7.1
all released