CVE-2015-7974

NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."
References
Link Resource
http://bugs.ntp.org/show_bug.cgi?id=2936 Issue Tracking Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2016-2583.html Third Party Advisory
http://support.ntp.org/bin/view/Main/NtpBug2936 Vendor Advisory
http://www.debian.org/security/2016/dsa-3629 Third Party Advisory
http://www.securityfocus.com/bid/81960 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1034782 Third Party Advisory VDB Entry
http://www.talosintel.com/reports/TALOS-2016-0071/ Exploit Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us Third Party Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc Third Party Advisory
https://security.gentoo.org/glsa/201607-15 Third Party Advisory
https://security.netapp.com/advisory/ntap-20171031-0001/ Third Party Advisory
https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11 Third Party Advisory US Government Resource
http://bugs.ntp.org/show_bug.cgi?id=2936 Issue Tracking Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2016-2583.html Third Party Advisory
http://support.ntp.org/bin/view/Main/NtpBug2936 Vendor Advisory
http://www.debian.org/security/2016/dsa-3629 Third Party Advisory
http://www.securityfocus.com/bid/81960 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1034782 Third Party Advisory VDB Entry
http://www.talosintel.com/reports/TALOS-2016-0071/ Exploit Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us Third Party Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc Third Party Advisory
https://security.gentoo.org/glsa/201607-15 Third Party Advisory
https://security.netapp.com/advisory/ntap-20171031-0001/ Third Party Advisory
https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:siemens:tim_4r-ie_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:tim_4r-ie:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:siemens:tim_4r-ie_dnp3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:tim_4r-ie_dnp3:-:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:37

Type Values Removed Values Added
References () http://bugs.ntp.org/show_bug.cgi?id=2936 - Issue Tracking, Vendor Advisory () http://bugs.ntp.org/show_bug.cgi?id=2936 - Issue Tracking, Vendor Advisory
References () http://rhn.redhat.com/errata/RHSA-2016-2583.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2016-2583.html - Third Party Advisory
References () http://support.ntp.org/bin/view/Main/NtpBug2936 - Vendor Advisory () http://support.ntp.org/bin/view/Main/NtpBug2936 - Vendor Advisory
References () http://www.debian.org/security/2016/dsa-3629 - Third Party Advisory () http://www.debian.org/security/2016/dsa-3629 - Third Party Advisory
References () http://www.securityfocus.com/bid/81960 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/81960 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1034782 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1034782 - Third Party Advisory, VDB Entry
References () http://www.talosintel.com/reports/TALOS-2016-0071/ - Exploit, Third Party Advisory () http://www.talosintel.com/reports/TALOS-2016-0071/ - Exploit, Third Party Advisory
References () https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf - Third Party Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf - Third Party Advisory
References () https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us - Third Party Advisory () https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us - Third Party Advisory
References () https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us - Third Party Advisory () https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us - Third Party Advisory
References () https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc - Third Party Advisory () https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc - Third Party Advisory
References () https://security.gentoo.org/glsa/201607-15 - Third Party Advisory () https://security.gentoo.org/glsa/201607-15 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20171031-0001/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20171031-0001/ - Third Party Advisory
References () https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11 - Third Party Advisory, US Government Resource () https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11 - Third Party Advisory, US Government Resource

Information

Published : 2016-01-26 19:59

Updated : 2024-11-21 02:37


NVD link : CVE-2015-7974

Mitre link : CVE-2015-7974

CVE.ORG link : CVE-2015-7974


JSON object : View

Products Affected

netapp

  • clustered_data_ontap
  • oncommand_balance

debian

  • debian_linux

siemens

  • tim_4r-ie_dnp3_firmware
  • tim_4r-ie
  • tim_4r-ie_dnp3
  • tim_4r-ie_firmware

ntp

  • ntp
CWE
CWE-287

Improper Authentication