Bug 1274256 (CVE-2015-7848) - CVE-2015-7848 ntp: multiple integer overflow read access violations
Summary: CVE-2015-7848 ntp: multiple integer overflow read access violations
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2015-7848
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1260670
TreeView+ depends on / blocked
 
Reported: 2015-10-22 11:29 UTC by Martin Prpič
Modified: 2021-02-17 04:48 UTC (History)
3 users (show)

Fixed In Version: ntp 4.2.8p4
Clone Of:
Environment:
Last Closed: 2015-10-23 07:31:15 UTC
Embargoed:


Attachments (Terms of Use)

Description Martin Prpič 2015-10-22 11:29:36 UTC
The following flaw was found in ntpd:

When processing a specially crafted private mode packet, an integer overflow can occur leading to out of bounds memory copy operation. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash.

External References:

http://talosintel.com/reports/TALOS-2015-0052/
http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_Security_Vulner

Comment 1 Martin Prpič 2015-10-23 07:31:15 UTC
Statement:

This issue did not affect the versions of ntp as shipped with Red Hat Enterprise Linux 5, 6, and 7, as they do not include the affected functionality.


Note You need to log in before you can comment on or make changes to this bug.