Red Hat Bugzilla – Bug 1550214
CVE-2018-7170 ntp: Ephemeral association time spoofing additional protection
Last modified: 2018-09-09 18:13:00 EDT
ntpd can be vulnerable to Sybil attacks. If a system is set up to use a trustedkey and if one is not using the feature introduced in ntp-4.2.8p6 allowing an optional 4th field in the ntp.keys file to specify which IPs can serve time, a malicious authenticated peer -- i.e. one where the attacker knows the private symmetric key -- can create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock.
Ps.: This is possibly a incomplete fix for CVE-2016-1549.
Created ntp tracking bugs for this issue:
Affects: fedora-all [bug 1550228]