Bugzilla – Bug 1011390
VUL-0: CVE-2016-7427: ntp: Broadcast Mode Replay Prevention DoS
Last modified: 2017-06-14 06:37:24 UTC
Summary: The broadcast mode of NTP is expected to only be used in a trusted network. If the broadcast network is accessible to an attacker, a potentially exploitable denial of service vulnerability in ntpd's broadcast mode replay prevention functionality can be abused. An attacker with access to the NTP broadcast domain can periodically inject specially crafted broadcast mode NTP packets into the broadcast domain which, while being logged by ntpd, can cause ntpd to reject broadcast mode packets from legitimate NTP broadcast servers. Mitigation: - Implement BCP-38. - Upgrade to 4.2.8p9, or later, from the NTP Project Download Page or the NTP Public Services Project Download Page - Properly monitor your ntpd instances, and auto-restart ntpd (without -g) if it stops running. Credit: This weakness was discovered by Matthew Van Gundy of Cisco.
http://support.ntp.org/bin/view/Main/NtpBug3114
bugbot adjusting priority
An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2016-12-08. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/63222
Packages submitted.
SUSE-SU-2016:3193-1: An update that solves 12 vulnerabilities and has three fixes is now available. Category: security (moderate) Bug References: 1009434,1011377,1011390,1011395,1011398,1011404,1011406,1011411,1011417,943216,956365,981252,988028,992038,992606 CVE References: CVE-2015-5219,CVE-2015-8139,CVE-2015-8140,CVE-2016-7426,CVE-2016-7427,CVE-2016-7428,CVE-2016-7429,CVE-2016-7431,CVE-2016-7433,CVE-2016-7434,CVE-2016-9310,CVE-2016-9311 Sources used: SUSE Linux Enterprise Server 11-SP4 (src): ntp-4.2.8p9-57.2 SUSE Linux Enterprise Debuginfo 11-SP4 (src): ntp-4.2.8p9-57.2
SUSE-SU-2016:3195-1: An update that solves 10 vulnerabilities and has 5 fixes is now available. Category: security (moderate) Bug References: 1009434,1011377,1011390,1011395,1011398,1011404,1011406,1011411,1011417,943216,956365,981252,988028,992038,992606 CVE References: CVE-2015-5219,CVE-2016-7426,CVE-2016-7427,CVE-2016-7428,CVE-2016-7429,CVE-2016-7431,CVE-2016-7433,CVE-2016-7434,CVE-2016-9310,CVE-2016-9311 Sources used: SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src): ntp-4.2.8p9-55.1 SUSE Linux Enterprise Server 12-SP2 (src): ntp-4.2.8p9-55.1 SUSE Linux Enterprise Server 12-SP1 (src): ntp-4.2.8p9-55.1 SUSE Linux Enterprise Desktop 12-SP2 (src): ntp-4.2.8p9-55.1 SUSE Linux Enterprise Desktop 12-SP1 (src): ntp-4.2.8p9-55.1
SUSE-SU-2016:3196-1: An update that solves 10 vulnerabilities and has 5 fixes is now available. Category: security (moderate) Bug References: 1009434,1011377,1011390,1011395,1011398,1011404,1011406,1011411,1011417,943216,956365,981252,988028,992038,992606 CVE References: CVE-2015-5219,CVE-2016-7426,CVE-2016-7427,CVE-2016-7428,CVE-2016-7429,CVE-2016-7431,CVE-2016-7433,CVE-2016-7434,CVE-2016-9310,CVE-2016-9311 Sources used: SUSE Linux Enterprise Server for SAP 12 (src): ntp-4.2.8p9-46.18.1 SUSE Linux Enterprise Server 12-LTSS (src): ntp-4.2.8p9-46.18.1
openSUSE-SU-2016:3280-1: An update that solves 10 vulnerabilities and has 5 fixes is now available. Category: security (moderate) Bug References: 1009434,1011377,1011390,1011395,1011398,1011404,1011406,1011411,1011417,943216,956365,981252,988028,992038,992606 CVE References: CVE-2015-5219,CVE-2016-7426,CVE-2016-7427,CVE-2016-7428,CVE-2016-7429,CVE-2016-7431,CVE-2016-7433,CVE-2016-7434,CVE-2016-9310,CVE-2016-9311 Sources used: openSUSE Leap 42.2 (src): ntp-4.2.8p9-27.1 openSUSE Leap 42.1 (src): ntp-4.2.8p9-27.1
released
SUSE-SU-2017:0255-1: An update that solves 12 vulnerabilities and has three fixes is now available. Category: security (moderate) Bug References: 1009434,1011377,1011390,1011395,1011398,1011404,1011406,1011411,1011417,943216,956365,981252,988028,992038,992606 CVE References: CVE-2015-5219,CVE-2015-8139,CVE-2015-8140,CVE-2016-7426,CVE-2016-7427,CVE-2016-7428,CVE-2016-7429,CVE-2016-7431,CVE-2016-7433,CVE-2016-7434,CVE-2016-9310,CVE-2016-9311 Sources used: SUSE OpenStack Cloud 5 (src): ntp-4.2.8p9-48.9.1 SUSE Manager Proxy 2.1 (src): ntp-4.2.8p9-48.9.1 SUSE Manager 2.1 (src): ntp-4.2.8p9-48.9.1 SUSE Linux Enterprise Server 11-SP3-LTSS (src): ntp-4.2.8p9-48.9.1 SUSE Linux Enterprise Server 11-SP2-LTSS (src): ntp-4.2.8p9-48.9.1 SUSE Linux Enterprise Point of Sale 11-SP3 (src): ntp-4.2.8p9-48.9.1 SUSE Linux Enterprise Debuginfo 11-SP3 (src): ntp-4.2.8p9-48.9.1 SUSE Linux Enterprise Debuginfo 11-SP2 (src): ntp-4.2.8p9-48.9.1