Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.0.703154 |
Category: | Debian Local Security Checks |
Title: | Debian Security Advisory DSA 3154-1 (ntp - security update) |
Summary: | Several vulnerabilities were;discovered in the ntp package, an implementation of the Network Time Protocol.;The Common Vulnerabilities and Exposures project identifies the following;problems:;;CVE-2014-9297;Stephen Roettger of the Google Security Team, Sebastian Krahmer of;the SUSE Security Team and Harlan Stenn of Network Time Foundation;discovered that the length value in extension fields is not properly;validated in several code paths in ntp_crypto.c, which could lead to;information leakage or denial of service (ntpd crash).;;CVE-2014-9298;Stephen Roettger of the Google Security Team reported that ACLs;based on IPv6 ::1 addresses can be bypassed. |
Description: | Summary: Several vulnerabilities were discovered in the ntp package, an implementation of the Network Time Protocol. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2014-9297 Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service (ntpd crash). CVE-2014-9298 Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 addresses can be bypassed. Affected Software/OS: ntp on Debian Linux Solution: For the stable distribution (wheezy), these problems have been fixed in version 1:4.2.6.p5+dfsg-2+deb7u2. For the unstable distribution (sid), these problems have been fixed in version 1:4.2.6.p5+dfsg-4. We recommend that you upgrade your ntp packages. CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2014-9297 Common Vulnerability Exposure (CVE) ID: CVE-2014-9298 |
Copyright | Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |