First published: Fri Dec 19 2014(Updated: )
As per upstream NTP security advisory: Prior to ntp-4.2.7p230 ntp-keygen used a weak seed to prepare a random number generator that was of good quality back in the late 1990s. The random numbers produced was then used to generate symmetric keys. In ntp-4.2.8 we use a current-technology cryptographic random number generator, either RAND_bytes from OpenSSL, or arc4random(). Mitigation: Upgrade to 4.2.7p230 or later. This vulnerability was discovered in ntp-4.2.6 by Stephen Roettger of the Google Security Team.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ntp | <4.2.8 | 4.2.8 |
NTP ntp | <=4.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9294 is considered to have a moderate severity level due to its impact on cryptographic key generation.
To fix CVE-2014-9294, update the NTP software to version 4.2.8 or later.
CVE-2014-9294 affects NTP versions prior to 4.2.8.
Using NTP versions prior to 4.2.8 poses a risk of compromising security due to the use of weak random number generation for cryptographic keys.
It is not recommended to continue using older versions of NTP even with additional security measures due to inherent vulnerabilities like CVE-2014-9294.