HIGH · 7.5

CVE-2015-5300

The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to ...

Vulnerability Description

The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).

CVSS Score

7.5

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
FedoraprojectFedora21
SuseLinux Enterprise Debuginfo11
OpensuseLeap42.1
OpensuseOpensuse13.2
SuseLinux Enterprise Desktop12
SuseLinux Enterprise Server10
SuseLinux Enterprise Software Development Kit12
SuseManager2.1
SuseManager Proxy2.1
SuseOpenstack Cloud5
SuseSuse Linux Enterprise Server12
RedhatEnterprise Linux Desktop6.0
RedhatEnterprise Linux Hpc Node6.0
RedhatEnterprise Linux Hpc Node Eus7.1
RedhatEnterprise Linux Server6.0
RedhatEnterprise Linux Server Eus6.7.z
RedhatEnterprise Linux Workstation6.0
DebianDebian Linux7.0
CanonicalUbuntu Linux12.04
NtpNtp<= 4.2.8

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-5300?

CVE-2015-5300 is a vulnerability with a CVSS score of 7.5 (HIGH). The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to ...

How severe is CVE-2015-5300?

CVE-2015-5300 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-5300?

Check the references section above for vendor advisories and patch information. Affected products include: Fedoraproject Fedora, Suse Linux Enterprise Debuginfo, Opensuse Leap, Opensuse Opensuse, Suse Linux Enterprise Desktop.