CVE-2015-7979

Related Vulnerabilities: CVE-2015-7979  

It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time.

It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time.

Find out more about CVE-2015-7979 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue affects the versions of ntp as shipped with Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue in Red Hat Enterprise Linux 6 and 7. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

CVSS v2 metrics

Base Score 5.8
Base Metrics AV:N/AC:M/Au:N/C:N/I:P/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 6 (ntp) RHSA-2016:1141 2016-05-31
Red Hat Enterprise Linux Extended Update Support 6.7 (ntp) RHSA-2016:1552 2016-08-03
Red Hat Enterprise Linux 7 (ntp) RHSA-2016:2583 2016-11-03
Red Hat Enterprise Linux 7 (ntp) RHSA-2016:1141 2016-05-31

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 5 ntp Will not fix

Mitigation

Do not use NTP's broadcast mode by not configuring the "broadcast" directive in the ntp.conf file.

External References