NTP Bug 3043

Autokey association reset

  • Date Resolved: 02 June 2016; Dev (4.3.93) 02 June 2016
  • References: Sec 3043 / CVE-2016-4955 / VU#321640
  • Affects: ntp-4, up to but not including ntp-4.2.8p8, and ntp-4.3.0 up to, but not including ntp-4.3.93.
  • CVSS2: LOW 2.6 (AV:N/AC:H/Au:N/C:N/I:N/A:P)
  • CVSS3: LOW 3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
  • Summary: An attacker who is able to spoof a packet with a correct origin timestamp before the expected response packet arrives at the target machine can send a CRYPTO_NAK or a bad MAC and cause the association's peer variables to be cleared. If this can be done often enough, it will prevent that association from working.
  • Mitigation:
  • Credit: This weakness was discovered by Miroslav Lichvar of Red Hat.

This topic: Main > SecurityNotice > NtpBug3043
Topic revision: r1 - 2016-06-02 - 12:42:01 - HarlanStenn
SSL security by CAcert
Get the CAcert Root Certificate
This site is powered by the TWiki collaboration platform
IPv6 Ready
Copyright & 1999-2021 by the contributing authors. All material on this collaboration platform is the property of the contributing authors. Ideas, requests, problems regarding the site? Send feedback