It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time.
Find out more about CVE-2015-7979 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue affects the versions of ntp as shipped with Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue in Red Hat Enterprise Linux 6 and 7. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
Base Score | 5.8 |
---|---|
Base Metrics | AV:N/AC:M/Au:N/C:N/I:P/A:P |
Access Vector | Network |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | Partial |
Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 6 (ntp) | RHSA-2016:1141 | 2016-05-31 |
Red Hat Enterprise Linux Extended Update Support 6.7 (ntp) | RHSA-2016:1552 | 2016-08-03 |
Red Hat Enterprise Linux 7 (ntp) | RHSA-2016:2583 | 2016-11-03 |
Red Hat Enterprise Linux 7 (ntp) | RHSA-2016:1141 | 2016-05-31 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 5 | ntp | Will not fix |
Do not use NTP's broadcast mode by not configuring the "broadcast" directive in the ntp.conf file.