5
CVSSv2

CVE-2009-0021

Published: 07/01/2009 Updated: 11/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

NTP 4.2.4 prior to 4.2.4p5 and 4.2.5 prior to 4.2.5p150 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote malicious users to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077.

Vulnerable Product Search on Vulmon Subscribe to Product

ntp ntp 4.2.4p1

ntp ntp 4.2.2

ntp ntp 4.2.4p3

ntp ntp 4.2.4p2

ntp ntp

ntp ntp 4.2.0

Vendor Advisories

Synopsis Moderate: ntp security update Type/Severity Security Advisory: Moderate Topic Updated ntp packages to correct a security issue are now available for RedHat Enterprise Linux 4 and 5This update has been rated as having moderate security impact by the RedHat Security Response Team Descripti ...
It was discovered that NTP did not properly perform signature verification A remote attacker could exploit this to bypass certificate validation via a malformed SSL/TLS signature ...
It has been discovered that NTP, an implementation of the Network Time Protocol, does not properly check the result of an OpenSSL function for verifying cryptographic signatures, which may ultimately lead to the acceptance of unauthenticated time information (Note that cryptographic authentication of time servers is often not enabled in the first ...