CVE-2016-1551

Loading...

General

Score:2.6/10.0
Severity:Low
Category:Implementation Error

Impact Metrics

Confidentiality:None
Integrity:Partial
Availability:None

Exploitability Metrics

Access Vector:Network
Access Complexity:High
Authentication:None

Relative vulnerabilities

CVE-2015-1798, CVE-2015-1799, CVE-2015-5194, CVE-2015-5300, CVE-2015-7691, CVE-2015-7692, CVE-2015-7701, CVE-2015-7702, CVE-2015-7703, CVE-2015-7704, CVE-2015-7705, CVE-2015-7848, CVE-2015-7849, CVE-2015-7850, CVE-2015-7851, CVE-2015-7852, CVE-2015-7853, CVE-2015-7854, CVE-2015-7855, CVE-2015-7871, CVE-2015-7973, CVE-2015-7974, CVE-2015-7975, CVE-2015-7976, CVE-2015-7977, CVE-2015-7978, CVE-2015-7979, CVE-2015-8138, CVE-2015-8158, CVE-2016-1547, CVE-2016-1548, CVE-2016-1549, CVE-2016-1550, CVE-2016-2516, CVE-2016-2517, CVE-2016-2518, CVE-2016-2519, CVE-2016-4953, CVE-2016-4954, CVE-2016-4955, CVE-2016-4956, CVE-2016-4957

Published on 27/01/17 - Updated on 21/11/17

Description

ntpd in NTP 4.2.8p3 and NTPsec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 relies on the underlying operating system to protect it from requests that impersonate reference clocks. Because reference clocks are treated like other peers and stored in the same structure, any packet with a source ip address of a reference clock (127.127.1.1 for example) that reaches the receive() function will match that reference clock's peer record and will be treated as a trusted peer. Any system that lacks the typical martian packet filtering which would block these packets is in danger of having its time controlled by an attacker.

Category: Implementation Error

CWE-254 (Security Features)
Software security is not security software. Here we're concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.

Security Notices

US National Vulnerability DatabaseCVE-2016-1551
Agence Nationale de la Sécurité des Systèmes d'Information CERTFR-2016-AVI-153, CERTFR-2017-AVI-365
Renater 2016/VULN183
SUSE SUSE-SU-2016:1278, SUSE-SU-2016:1291, SUSE-SU-2016:1471, SUSE-SU-2016:1568, SUSE-SU-2016:1912

Exploits

No exploits available for this CVE in our database.

Relative technologies

VendorProduct
ntpntp
ntpsecntpsec

Share this vulnerability with:

Twitter Facebook LinkedIn Mail