{"vuid":"VU#852879","idnumber":"852879","name":"NTP Project Network Time Protocol daemon (ntpd) contains multiple vulnerabilities (Updated)","keywords":["NTP","ntpd","buffer overflow","weak key","random number generator"],"overview":"The NTP Project ntpd version 4.2.7 and pervious versions contain several vulnerabilities. ntp-keygen prior to version 4.2.7p230 also uses a non-cryptographic random number generator when generating symmetric keys. These vulnerabilities may affect ntpd acting as a server or client.","clean_desc":"The Network Time Protocol (NTP) provides networked systems and devices with a way to synchronize time for various services and applications. The reference implementation produced by the NTP Project (ntp.org) contains several vulnerabilities. CWE-290: Authentication Bypass by Spoofing - CVE-2014-9298 The IPv6 address ::1 can be spoofed, allowing an attacker to bypass ACLs based on ::1. CWE-754: Improper Check for Unusual or Exceptional Conditions - CVE-2014-9297 The length value in extension field pointers is not properly validated, allowing information leaks. CWE-332: Insufficient Entropy in PRNG - CVE-2014-9293 If no authentication key is defined in the ntp.conf file, a cryptographically-weak default key is generated. CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) - CVE-2014-9294 ntp-keygen before 4.2.7p230 uses a non-cryptographic random number generator with a weak seed to generate symmetric keys. CWE-121: Stack Buffer Overflow - CVE-2014-9295 A remote unauthenticated attacker may craft special packets that trigger buffer overflows in the ntpd functions crypto_recv() (when using autokey authentication), ctl_putdata(), and configure(). The resulting buffer overflows may be exploited to allow arbitrary malicious code to be executed with the privilege of the ntpd process. CWE-389: Error Conditions, Return Values, Status Codes - CVE-2014-9296 A section of code in ntpd handling a rare error is missing a return statement, therefore processing did not stop when the error was encountered. This situation may be exploitable by an attacker. The NTP Project provides more information about these issues in their security advisory. The NTP Project implementation is widely used in operating system distributions and network products. These vulnerabilities affect ntpd acting as a server or client. CERT/CC is not aware of any public exploit of these vulnerabilities at this time. The CVSS score below is based on the buffer overflow vulnerabilities (CVE-2014-9295).","impact":"The buffer overflow vulnerabilities in ntpd may allow a remote unauthenticated attacker to execute arbitrary malicious code with the privilege level of the ntpd process. The weak default key and non-cryptographic random number generator in ntp-keygen may allow an attacker to gain information regarding the integrity checking and authentication encryption schemes. More specifically, the weak default key allows access to private mode and control mode queries that require authentication, if not restricted by the configuration.","resolution":"Apply an update These issues have been addressed in ntp-4.2.8p1. The update may be downloaded from ntp.org.","workarounds":"Restrict status queries As noted in the announcement for ntp-4.2.8: The vulnerabilities listed below can be significantly mitigated by following the BCP of putting restrict default ... noquery in the ntp.conf file. With the exception of: receive(): missing return on error\n   References: Sec 2670 / CVE-2014-9296 / VU#852879 below (which is a limited-risk vulnerability), none of the recent vulnerabilities listed below can be exploited if the source IP is restricted from sending a 'query'-class packet by your ntp.conf file. Use firewall rules Install firewall rules that block ::1 IPv6 address from inappropriate network interfaces. Disable autokey authentication Disable Autokey Authentication by removing, or commenting out, all configuration directives beginning with the crypto keyword in your ntp.conf file.","sysaffected":"","thanks":"The NTP Project credits Stephen Roettger and Neel Mehta of the Google Security Team for discovering these vulnerabilities.","author":"This document was written by Garret Wassermann.","public":["http://support.ntp.org/bin/view/Main/SecurityNotice","http://lists.ntp.org/pipermail/announce/2014-December/000122.html","http://support.ntp.org/bin/view/Support/AccessRestrictions#Section_6.5.2","http://www.ntp.org/downloads.html","http://www.ntp.org/ntpfaq/NTP-s-algo-crypt.htm","http://googleprojectzero.blogspot.com/2015/01/finding-and-exploiting-ntpd.html","https://ics-cert.us-cert.gov/advisories/ICSA-14-353-01"],"cveids":["CVE-2014-9293","CVE-2014-9294","CVE-2014-9295","CVE-2014-9296","CVE-2014-9297","CVE-2014-9298"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2014-12-03T22:15:19Z","publicdate":"2014-12-19T00:00:00Z","datefirstpublished":"2014-12-19T17:25:19Z","dateupdated":"2015-10-27T02:22:24Z","revision":124,"vrda_d1_directreport":"1","vrda_d1_population":"4","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"H","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"7.5","cvss_basevector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","cvss_temporalscore":"5.9","cvss_environmentalscore":"5.86048806962325","cvss_environmentalvector":"CDP:ND/TD:H/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}