First published: Wed Aug 19 2015(Updated: )
It was discovered that sntp program would hang in an infinite loop when a crafted NTP packet was received, related to the conversion of the precision value in the packet to double.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens TIM 4R-IE | ||
Siemens TIM 4R-IE DNP3 | ||
Fedora | =21 | |
Fedora | =22 | |
Fedora | =23 | |
SUSE Linux Enterprise Debuginfo | =11-sp2 | |
SUSE Linux Enterprise Debuginfo | =11-sp3 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp3 | |
SUSE Manager | =2.1 | |
suse manager proxy | =2.1 | |
openSUSE OpenStack Cloud | =5 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =6.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
Debian | =7.0 | |
Debian | =8.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.04 | |
Ubuntu | =15.10 | |
NTP ntp | <=4.2.7 | |
Novell Leap | =42.2 | |
openSUSE | =42.1 | |
Siemens TIM 4R-IE DNP3 | ||
Siemens TIM 4R-IE DNP3 | ||
Siemens TIM 4R-ID DNP3 | ||
Siemens TIM 4R-ID DNP3 | ||
Oracle Linux | =6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5219 is rated as a medium severity vulnerability due to its potential to cause denial of service by hanging in an infinite loop.
To mitigate CVE-2015-5219, update to the patched version of the NTP software that resolves the type conversion issue.
CVE-2015-5219 affects various versions of the SNTP program, including Siemens TIM 4R-IE and Fedora versions 21, 22, and 23.
Currently, there is no known workaround for CVE-2015-5219 aside from applying the recommended patches.
CVE-2015-5219 is a denial of service vulnerability caused by improper handling of crafted NTP packets.