First published: Tue Oct 06 2015(Updated: )
The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before 4.2.8p1 on Linux and OS X does not properly determine whether a source IP address is an IPv6 loopback address, which makes it easier for remote attackers to spoof restricted packets, and read or write to the runtime state, by leveraging the ability to reach the ntpd machine's network interface with a packet from the ::1 address.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NTP | >=4.2.0<4.2.8 | |
NTP | =4.2.8 | |
Apple iOS and macOS | ||
Linux kernel | ||
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Debian | =7.0 | |
Debian | =8.0 | |
Debian | =9.0 | |
Oracle Linux | =7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9751 is considered a moderate severity vulnerability that allows remote attackers to spoof restricted packets.
To fix CVE-2014-9751, upgrade NTP to version 4.2.8p1 or later.
NTP versions before 4.2.8p1, specifically 4.2.0 through 4.2.8, are affected by CVE-2014-9751.
Yes, CVE-2014-9751 affects NTP versions running on Linux and macOS platforms.
CVE-2014-9751 can facilitate attacks that allow remote attackers to read or write to the runtime state of the NTP service.