CVE-2015-7974
Publication date 26 January 2016
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."
Status
Package | Ubuntu Release | Status |
---|---|---|
ntp | ||
16.04 LTS xenial |
Fixed 1:4.2.8p4+dfsg-3ubuntu5.3
|
|
14.04 LTS trusty |
Fixed 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10
|
|
Notes
mdeslaur
fedora has an alternate fix http://lists.ntp.org/pipermail/hackers/2016-January/007416.html
Patch details
Package | Patch details |
---|---|
ntp |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.7 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Changed |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-3096-1
- NTP vulnerabilities
- 5 October 2016