Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1340850 - (CVE-2016-4957) CVE-2016-4957 ntp: crypto-NAK DoS (incorrect fix for CVE-2016-1547)
CVE-2016-4957 ntp: crypto-NAK DoS (incorrect fix for CVE-2016-1547)
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20160602,repor...
: Security
Depends On:
Blocks: 1302226
  Show dependency treegraph
 
Reported: 2016-05-30 08:16 EDT by Martin Prpič
Modified: 2016-07-06 06:54 EDT (History)
5 users (show)

See Also:
Fixed In Version: ntp-4.2.8p7
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-05-30 08:58:58 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Martin Prpič 2016-05-30 08:16:57 EDT
It was found that the fix for CVE-2016-1547 introduced a new issue. An attacker could send a crafted packet with crypto-NAK to a server or client that will cause ntpd to crash (segfault on NULL pointer dereference).

The issue was introduced in the original patch for CVE-2016-1547 here:

http://bk1.ntp.org/ntp-stable/?PAGE=patch&REV=56b42514rgZyUCPCWq2Uyhw4BWUpSg
Comment 1 Martin Prpič 2016-05-30 08:17:01 EDT
Acknowledgments:

Name: CERT/CC
Upstream: Nicolas Edet (Cisco)
Comment 2 Martin Prpič 2016-05-30 08:58:58 EDT
Statement:

This issue did not affect the versions of ntp as shipped with any Red Hat Enterprise Linux version as they did not include the same upstream fix for CVE-2016-1547 that introduced the issue. The fix developed by Red Hat for CVE-2016-1547 did not include this issue.

Note You need to log in before you can comment on or make changes to this bug.