Vulnerability Description
The "pidfile" or "driftfile" directives in NTP ntpd 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77, when ntpd is configured to allow remote configuration, allows remote attackers with an IP address that is allowed to send configuration requests, and with knowledge of the remote configuration password to write to arbitrary files via the :config command.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ntp | Ntp | >= 4.2.0, < 4.2.8 |
| Oracle | Linux | 6 |
| Debian | Debian Linux | 7.0 |
| Netapp | Oncommand Performance Manager | - |
| Netapp | Oncommand Unified Manager | - |
| Netapp | Clustered Data Ontap | - |
| Netapp | Data Ontap | - |
| Redhat | Enterprise Linux Desktop | 6.0 |
| Redhat | Enterprise Linux Server | 6.0 |
| Redhat | Enterprise Linux Server Aus | 7.3 |
| Redhat | Enterprise Linux Server Eus | 7.3 |
| Redhat | Enterprise Linux Server Tus | 7.3 |
| Redhat | Enterprise Linux Workstation | 6.0 |
Related Weaknesses (CWE)
References
- http://rhn.redhat.com/errata/RHSA-2016-0780.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-2583.htmlThird Party Advisory
- http://support.ntp.org/bin/view/Main/NtpBug2902Vendor Advisory
- http://www.debian.org/security/2015/dsa-3388Third Party Advisory
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.hThird Party Advisory
- http://www.securityfocus.com/bid/77278Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1033951Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=1254547Issue TrackingThird Party AdvisoryVDB Entry
- https://security.gentoo.org/glsa/201607-15Third Party Advisory
- https://security.netapp.com/advisory/ntap-20171004-0001/Third Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-0780.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-2583.htmlThird Party Advisory
- http://support.ntp.org/bin/view/Main/NtpBug2902Vendor Advisory
- http://www.debian.org/security/2015/dsa-3388Third Party Advisory
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.hThird Party Advisory
FAQ
What is CVE-2015-7703?
CVE-2015-7703 is a vulnerability with a CVSS score of 7.5 (HIGH). The "pidfile" or "driftfile" directives in NTP ntpd 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77, when ntpd is configured to allow remote configuration, allows remote attackers with an IP address tha...
How severe is CVE-2015-7703?
CVE-2015-7703 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-7703?
Check the references section above for vendor advisories and patch information. Affected products include: Ntp Ntp, Oracle Linux, Debian Debian Linux, Netapp Oncommand Performance Manager, Netapp Oncommand Unified Manager.