Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1331467 - (CVE-2016-2517) CVE-2016-2517 ntp: certain remote configuration values not properly validated
CVE-2016-2517 ntp: certain remote configuration values not properly validated
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20160426,reported=2...
: Security
Depends On: 1332160
Blocks: 1331437
  Show dependency treegraph
 
Reported: 2016-04-28 10:53 EDT by Martin Prpič
Modified: 2016-05-14 03:15 EDT (History)
5 users (show)

See Also:
Fixed In Version: ntp 4.2.8p7
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-05-02 08:51:14 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Knowledge Base (Solution) 2300641 None None None 2016-05-05 21:29 EDT

  None (edit)
Description Martin Prpič 2016-04-28 10:53:12 EDT
The following flaw was found in ntpd:

If ntpd was expressly configured to allow for remote configuration, a malicious user who knows the controlkey for ntpq or the requestkey for ntpdc (if mode7 is expressly enabled) can create a session with ntpd and then send a crafted packet to ntpd that will change the value of the trustedkey, controlkey, or requestkey to a value that will prevent any subsequent authentication with ntpd until ntpd is restarted. 

Upstream bugs:

http://support.ntp.org/bin/view/Main/NtpBug3010

External References:

http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
Comment 1 Martin Prpič 2016-05-02 07:37:53 EDT
Created ntp tracking bugs for this issue:

Affects: fedora-all [bug 1332160]
Comment 2 Martin Prpič 2016-05-02 08:51:14 EDT
Statement:

Red Hat Product Security does not consider this to be a security issue. An authenticated user could use various other means to disable access to an NTP server (for example, using the 'restrict' command). To mitigate this issue, disable remote configuration of NTP, or restrict this ability to trusted users.

Note You need to log in before you can comment on or make changes to this bug.