First published: Wed Jan 21 2015(Updated: )
It was reported [1] that ntp miss validation of vallen value, leading to various info leaks: * ntpd/ntp_crypto.c:571 * ntpd/ntp_crypto.c:1162 * ntpd/ntp_crypto.c:1559 * ntpd/ntp_crypto.c:2117 * ntpd/ntp_crypto.c:1461 Upstream commits that fixes this: <a href="http://bk.ntp.org/ntp-stable/?PAGE=patch&REV=5492d353ncauuWt_PONxaDhC5Qv_SA">http://bk.ntp.org/ntp-stable/?PAGE=patch&REV=5492d353ncauuWt_PONxaDhC5Qv_SA</a> <a href="http://bk1.ntp.org/ntp-stable/?PAGE=patch&REV=54abb266In81wLNAqIaovtP8f2UmUw">http://bk1.ntp.org/ntp-stable/?PAGE=patch&REV=54abb266In81wLNAqIaovtP8f2UmUw</a> <a href="http://bk1.ntp.org/ntp-stable/?PAGE=patch&REV=54a7c595jlwS3KmAxBML75HFGLR_pQ">http://bk1.ntp.org/ntp-stable/?PAGE=patch&REV=54a7c595jlwS3KmAxBML75HFGLR_pQ</a> [1]: <a href="http://bugs.ntp.org/2671">http://bugs.ntp.org/2671</a>
Affected Software | Affected Version | How to fix |
---|---|---|
NTP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1184573 is classified as high due to the potential for information leaks.
To fix REDHAT-BUG-1184573, ensure that you apply the upstream patches that address the validation issues in ntp.
REDHAT-BUG-1184573 affects the NTP (Network Time Protocol) software.
Not addressing REDHAT-BUG-1184573 can lead to information exposure and potential exploitation of the NTP service.
Currently, there are no official workarounds for REDHAT-BUG-1184573, so applying the patch is essential.