Bug 1274264 (CVE-2015-7855) - CVE-2015-7855 ntp: ASSERT in decodenetnum() on invalid values
Summary: CVE-2015-7855 ntp: ASSERT in decodenetnum() on invalid values
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2015-7855
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1296162
Blocks: 1260670
TreeView+ depends on / blocked
 
Reported: 2015-10-22 11:32 UTC by Martin Prpič
Modified: 2019-10-10 10:23 UTC (History)
7 users (show)

Fixed In Version: ntp 4.2.8p4
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-01-07 13:22:05 UTC


Attachments (Terms of Use)


Links
System ID Priority Status Summary Last Updated
Red Hat Knowledge Base (Solution) 2024443 None None None Never

Description Martin Prpič 2015-10-22 11:32:33 UTC
It was found that NTP's decodenetnum() would abort with an assertion failure when processing a mode 6 or mode 7 packet containing an unusually long data value where a network address was expected. This could allow an authenticated attacker to crash ntpd.

External References:

https://github.com/ntp-project/ntp/blob/stable/NEWS#L295
http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_Security_Vulner

Comment 5 Martin Prpič 2016-01-06 13:54:04 UTC
Created ntp tracking bugs for this issue:

Affects: fedora-all [bug 1296162]

Comment 7 Martin Prpič 2016-01-07 13:22:05 UTC
Statement:

This issue did not affect the versions of ntp as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they do not include support for the mrulist feature, which exposes the decodenetnum() function.


Note You need to log in before you can comment on or make changes to this bug.