Vulnerability Description
The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ntp | Ntp | >= 4.2.0, < 4.2.8 |
| Oracle | Solaris | 10 |
| Suse | Manager | 2.1 |
| Suse | Manager Proxy | 2.1 |
| Suse | Openstack Cloud | 5 |
| Opensuse | Leap | 42.1 |
| Opensuse | Opensuse | 13.2 |
| Suse | Linux Enterprise Desktop | 12 |
| Suse | Linux Enterprise Server | 11 |
| Siemens | Simatic Net Cp 443-1 Opc Ua Firmware | All versions |
| Siemens | Simatic Net Cp 443-1 Opc Ua | - |
| Siemens | Tim 4R-Ie Firmware | All versions |
| Siemens | Tim 4R-Ie | - |
| Siemens | Tim 4R-Ie Dnp3 Firmware | All versions |
| Siemens | Tim 4R-Ie Dnp3 | - |
Related Weaknesses (CWE)
References
- http://bugs.ntp.org/3044Issue TrackingVendor Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00023.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00028.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00040.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html
- http://packetstormsecurity.com/files/137321/Slackware-Security-Advisory-ntp-Upda
- http://packetstormsecurity.com/files/137322/FreeBSD-Security-Advisory-FreeBSD-SA
- http://support.ntp.org/bin/view/Main/NtpBug3044PatchVendor Advisory
- http://support.ntp.org/bin/view/Main/SecurityNoticeVendor Advisory
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20
- http://www.kb.cert.org/vuls/id/321640Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2016-4954?
CVE-2016-4954 is a vulnerability with a CVSS score of 7.5 (HIGH). The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many sour...
How severe is CVE-2016-4954?
CVE-2016-4954 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-4954?
Check the references section above for vendor advisories and patch information. Affected products include: Ntp Ntp, Oracle Solaris, Suse Manager, Suse Manager Proxy, Suse Openstack Cloud.