ArchLinux: 201412-24: ntp: multiple issues
Summary
Keys explicitly generated by "ntp-keygen -M" should be regenerated.
- CVE-2014-9293 (weak key generation)
ntpd generated a weak key for its internal use, with full administrative
privileges. Attackers could use this key to reconfigure ntpd (or to
exploit other vulnerabilities).
- CVE-2014-9294 (weak key generation)
The ntp-keygen utility generated weak MD5 keys with insufficient
entropy, which makes it easier for remote attackers to defeat
cryptographic protection mechanisms via a brute-force attack.
- CVE-2014-9295 (arbitrary code execution)
Multiple stack-based buffer overflows in allow remote attackers to
execute arbitrary code via a crafted packet, related to (1) the
crypto_recv function when the Autokey Authentication feature is used,
(2) the ctl_putdata function, and (3) the configure function.
- CVE-2014-9296 (unintended association change)
The receive function in ntp_proto.c continues to execute after detecting
a certain authentication error, which might allow remote attackers to
trigger an unintended association change via crafted packets.
Resolution
Upgrade to 4.2.8-1.
# pacman -Syu "ntp>=4.2.8-1"
The problems have been fixed upstream in version 4.2.8.
References
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9293 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9294 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9295 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9296 https://bugs.ntp.org/show_bug.cgi?id=2665 https://bugs.ntp.org/show_bug.cgi?id=2666 https://bugs.ntp.org/show_bug.cgi?id=2667 https://bugs.ntp.org/show_bug.cgi?id=2670
Workaround
None.