| 2 | |
| 3 | [http://lists.ntp.org/pipermail/announce/2014-December/000122.html] |
| 4 | |
| 5 | Summary of the announcement: |
| 6 | |
| 7 | {{{ |
| 8 | Harlan Stenn stenn at ntp.org |
| 9 | Mon Dec 22 00:42:24 UTC 2014 |
| 10 | |
| 11 | ... |
| 12 | |
| 13 | NTP 4.2.8 (Harlan Stenn <stenn at ntp.org>, 2014/12/18) |
| 14 | |
| 15 | Focus: Security and Bug fixes, enhancements. |
| 16 | |
| 17 | Severity: HIGH |
| 18 | |
| 19 | In addition to bug fixes and enhancements, this release fixes the |
| 20 | following high-severity vulnerabilities: |
| 21 | |
| 22 | ************************** vv NOTE WELL vv ***************************** |
| 23 | |
| 24 | The vulnerabilities listed below can be significantly mitigated by |
| 25 | following the BCP of putting |
| 26 | |
| 27 | restrict default ... noquery |
| 28 | |
| 29 | in the ntp.conf file. With the exception of: |
| 30 | |
| 31 | receive(): missing return on error |
| 32 | References: Sec 2670 / CVE-2014-9296 / VU#852879 |
| 33 | |
| 34 | below (which is a limited-risk vulnerability), none of the recent |
| 35 | vulnerabilities listed below can be exploited if the source IP is |
| 36 | restricted from sending a 'query'-class packet by your ntp.conf file. |
| 37 | |
| 38 | ************************** ^^ NOTE WELL ^^ ***************************** |
| 39 | |
| 40 | * Weak default key in config_auth(). |
| 41 | ... |
| 42 | * Non-cryptographic random number generator with weak seed used by |
| 43 | ntp-keygen to generate symmetric keys. |
| 44 | ... |
| 45 | * Buffer overflow in crypto_recv() |
| 46 | ... |
| 47 | * Buffer overflow in ctl_putdata() |
| 48 | ... |
| 49 | * Buffer overflow in configure() |
| 50 | ... |
| 51 | * receive(): missing return on error |
| 52 | ... |
| 53 | |
| 54 | See http://support.ntp.org/security for more information. |
| 55 | |
| 56 | New features / changes in this release: |
| 57 | |
| 58 | Important Changes |
| 59 | |
| 60 | * Internal NTP Era counters |
| 61 | ... |
| 62 | * ntpdc responses disabled by default |
| 63 | ... |
| 64 | }}} |