First published: Fri Jan 06 2017(Updated: )
A malicious authenticated peer can create arbitrarily-many ephemeral associations in order to win the clock selection algorithm in ntpd in NTP 4.2.8p4 and earlier and NTPsec 3e160db8dc248a0bcb053b56a80167dc742d2b74 and a5fb34b9cc89b92a8fef2f459004865c93bb7f92 and modify a victim's clock.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
NTP | =4.2.8-p4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1549 is considered a high severity vulnerability due to its potential to compromise time synchronization.
To fix CVE-2016-1549, upgrade NTP to version 4.2.8p5 or later, as well as ensure that you are using the latest version of NTPsec.
CVE-2016-1549 allows a malicious authenticated peer to manipulate the clock selection process, potentially leading to unauthorized time changes.
CVE-2016-1549 affects NTP version 4.2.8p4 and all earlier versions.
CVE-2016-1549 requires malicious users to have authenticated access to the NTP server to exploit the vulnerability.