First published: Tue Oct 27 2009(Updated: )
ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ntp | <0:4.1.2-6.el3 | 0:4.1.2-6.el3 |
redhat/ntp | <0:4.2.0.a.20040617-8.el4_8.1 | 0:4.2.0.a.20040617-8.el4_8.1 |
redhat/ntp | <0:4.2.2p1-9.el5_4.1 | 0:4.2.2p1-9.el5_4.1 |
NTP ntp | <=4.2.2p4 | |
NTP ntp | =4.0.72 | |
NTP ntp | =4.0.73 | |
NTP ntp | =4.0.90 | |
NTP ntp | =4.0.91 | |
NTP ntp | =4.0.92 | |
NTP ntp | =4.0.93 | |
NTP ntp | =4.0.94 | |
NTP ntp | =4.0.95 | |
NTP ntp | =4.0.96 | |
NTP ntp | =4.0.97 | |
NTP ntp | =4.0.98 | |
NTP ntp | =4.0.99 | |
NTP ntp | =4.1.0 | |
NTP ntp | =4.1.2 | |
NTP ntp | =4.2.0 | |
NTP ntp | =4.2.2 | |
NTP ntp | =4.2.2p1 | |
NTP ntp | =4.2.2p2 | |
NTP ntp | =4.2.2p3 | |
NTP ntp | =4.2.5 | |
<=4.2.2p4 | ||
=4.0.72 | ||
=4.0.73 | ||
=4.0.90 | ||
=4.0.91 | ||
=4.0.92 | ||
=4.0.93 | ||
=4.0.94 | ||
=4.0.95 | ||
=4.0.96 | ||
=4.0.97 | ||
=4.0.98 | ||
=4.0.99 | ||
=4.1.0 | ||
=4.1.2 | ||
=4.2.0 | ||
=4.2.2 | ||
=4.2.2p1 | ||
=4.2.2p2 | ||
=4.2.2p3 | ||
=4.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3563 has a severity rating that indicates a denial of service vulnerability due to CPU and bandwidth consumption.
To fix CVE-2009-3563, upgrade to NTP versions that are patched—specifically 4.2.4p8 or later.
CVE-2009-3563 affects various versions of the NTP daemon, specifically those prior to 4.2.4p8 and 4.2.5.
CVE-2009-3563 exploits a vulnerability that allows remote attackers to send spoofed requests causing excessive resource consumption.
If upgrading is not possible, restricting access to NTP services or implementing firewall rules may mitigate the risk associated with CVE-2009-3563.