First published: Thu Apr 28 2016(Updated: )
An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ntp | 1:4.2.8p12+dfsg-4 1:4.2.8p15+dfsg-1 | |
redhat/ntp | <4.2.8 | 4.2.8 |
Siemens TIM 4R-IE | ||
Siemens TIM 4R-IE DNP3 | ||
Siemens Simatic Net CP 443-1 OPC UA Firmware | ||
NTP | <=4.2.8 | |
<=4.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1547 is rated as a medium severity vulnerability due to its potential for unauthorized association demobilization.
To mitigate CVE-2016-1547, upgrade NTP to version 4.2.8p12+dfsg-4 or later for Debian, or 4.2.8 version or later for Red Hat.
CVE-2016-1547 affects NTP versions up to and including 4.2.8p4, as well as various Siemens products that utilize vulnerable NTP versions.
Yes, CVE-2016-1547 allows an off-path attacker to send spoofed packets to exploit the vulnerability.
CVE-2016-1547 impacts systems running NTP versions prior to 4.2.8p12 and related Siemens products.