First published: Mon Jul 24 2017(Updated: )
The "pidfile" or "driftfile" directives in NTP ntpd 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77, when ntpd is configured to allow remote configuration, allows remote attackers with an IP address that is allowed to send configuration requests, and with knowledge of the remote configuration password to write to arbitrary files via the :config command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NTP | >=4.2.0<4.2.8 | |
NTP | >=4.3.0<4.3.77 | |
NTP | =4.2.8 | |
NTP | =4.2.8-p1 | |
NTP | =4.2.8-p1-beta1 | |
NTP | =4.2.8-p1-beta2 | |
NTP | =4.2.8-p1-beta3 | |
NTP | =4.2.8-p1-beta4 | |
NTP | =4.2.8-p1-beta5 | |
NTP | =4.2.8-p1-rc1 | |
NTP | =4.2.8-p1-rc2 | |
NTP | =4.2.8-p2 | |
NTP | =4.2.8-p2-rc1 | |
NTP | =4.2.8-p2-rc2 | |
NTP | =4.2.8-p2-rc3 | |
NTP | =4.2.8-p3 | |
NTP | =4.2.8-p3-rc1 | |
NTP | =4.2.8-p3-rc2 | |
NTP | =4.2.8-p3-rc3 | |
Oracle Linux | =6 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 | |
NetApp OnCommand Performance Manager | ||
NetApp OnCommand Unified Manager | ||
IBM Data ONTAP | ||
IBM Data ONTAP | ||
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.5 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7703 has a severity rating of important, as it allows remote attackers to exploit configuration settings.
To fix CVE-2015-7703, upgrade NTP to version 4.2.8p4 or higher for 4.2.x, or 4.3.77 or higher for 4.3.x.
CVE-2015-7703 affects NTP versions 4.2.0 to 4.2.8p3 and 4.3.0 to 4.3.76.
CVE-2015-7703 allows attackers to perform unauthorized management actions on the NTP server due to remote configuration vulnerabilities.
As a temporary workaround for CVE-2015-7703, disable remote configuration on the NTP server.