NTP安全漏洞公告

    NTP服务今天公告了几个高危漏洞,大概信息如下:

描述:包含缓冲区溢出等多个高危或低危漏洞。

危害:可以利用获取服务器权限完全控制服务器,至少可以造成服务器崩溃。

影响范围:只有升级到4.2.8才能解决所有漏洞,我们当前用的是4.2.6

漏洞验证:目前尚未公布可用于验证的攻击模块,为避免风险,建议直接升级。

缓解措施:可以在ntp.conf限制查询时间的来源机器,但是我们是开放给在互联网上的设备的,无法做这样的限制,由于poc未公布,也没有办法通过防火墙堵截,只能暂时关闭NTP服务,建议尽快直接升级。

更多信息和补丁参考以下地址:

http://support.ntp.org/bin/view/Main/SecurityNotice(详细内容贴在下面)

按照升级补丁流程,先在预发布验证功能OK再升级。

另外,由于NTP是个和其它业务无相关性的服务,可做单独完全隔离,降低风险。

 

Security Notice

Notification Policy

When we discover a security vulnerability in NTP we first notify institutional members of the NTP Consortium at Network Time Foundation, then CERT, and finally make a public announcement.

Reporting Security Issues

Security related bugs, confirmed or suspected, are to be reported by e-mail to [email protected].

Please refrain from discussing potential security issues in public fora such as the comp.protocols.time.ntp Usenet news-group, our Bug Tracking system, [email protected], or any other mailing-list.

Active Vulnerabilities

NTF‘s NTP Project has been notified of a number of vulnerabilities from Neel Mehta and Stephen Roettger of Google‘s Security Team. The two most serious of these issues and four less serious issues have been resolved as of ntp-4.2.8, which was released on 18 December 2014. There are still two less significant issues to be addressed. We‘re expecting to fix these within the next month.

Resolved Vulnerabilities

The following vulnerabilities have been reported for the Reference Implementation of NTP during the 20+ years that the NTP Project has existed.

Weak default key in config_auth()

  • References: Sec 2665 / CVE-2014-9293 / VU#852879
  • CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3
  • Versions: All NTP4 releases before 4.2.7p11
  • Date Resolved: Dev (4.2.7p11) 28 Jan 2010
  • Summary: If no auth key is set in the configuration file, ntpd would generate a random key on the fly. There were two problems with this: 1) the generated key was 31 bits in size, and 2) it used the (now weak) ntp_random() function, which was seeded with a 32 bit value and can only provide 32 bits of entropy. This was sufficient back in the late 1990s when this code was written. Not today.
  • Mitigation - any of:
  • Credit: This vulnerability was discovered in ntp-4.2.6 by Neel Mehta of the Google Security Team.

non-cryptographic random number generator with weak seed used by ntp-keygen to generate symmetric keys

  • References: Sec 2666 / CVE-2014-9294 / VU#852879
  • CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3
  • Versions: All NTP4 releases before 4.2.7p230
  • Date Resolved: Dev (4.2.7p230) 01 Nov 2011
  • Summary: Prior to ntp-4.2.7p230 ntp-keygen used a weak seed to prepare a random number generator that was of good quality back in the late 1990s. The random numbers produced was then used to generate symmetric keys. In ntp-4.2.8 we use a current-technology cryptographic random number generator, either RAND_bytes from OpenSSL, or arc4random().
  • Mitigation - any of:
  • Credit: This vulnerability was discovered in ntp-4.2.6 by Stephen Roettger of the Google Security Team.

Buffer overflow in crypto_recv()

  • References: Sec 2667 / CVE-2014-9295 / VU#852879
  • CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
  • Versions: All releases before 4.2.8
  • Date Resolved: Stable (4.2.8) 18 Dec 2014
  • Summary: When Autokey Authentication is enabled (i.e. the ntp.conf file contains a crypto pw ... directive) a remote attacker can send a carefully crafted packet that can overflow a stack buffer and potentially allow malicious code to be executed with the privilege level of the ntpd process.
  • Mitigation - any of:
    • Upgrade to 4.2.8, or later, from the NTP Project Download Page or the NTP Public Services Project Download Page
    • Disable Autokey Authentication by removing, or commenting out, all configuration directives beginning with the crypto keyword in your ntp.conf file.
    • Put restrict ... noquery in your ntp.conf file, for non-trusted senders.
  • Credit: This vulnerability was discovered by Stephen Roettger of the Google Security Team.

Buffer overflow in ctl_putdata()

Buffer overflow in configure()

receive(): missing return on error

  • References: Sec 2670 / CVE-2014-9296 / VU#852879
  • Versions: All NTP4 releases before 4.2.8
  • CVSS: (AV:N/AC:L/Au:N/C:N/I:N/A:P) Base Score: 5.0
  • Date Resolved: Stable (4.2.8) 18 Dec 2014
  • Summary: Code in ntp_proto.c:receive() is missing a return; in the code path where an error was detected, which meant processing did not stop when a specific rare error occurred. We haven‘t found a way for this bug to affect system integrity. If there is no way to affect system integrity the base CVSS score for this bug is 0. If there is one avenue through which system integrity can be partially affected, the base score becomes a 5. If system integrity can be partially affected via all three integrity metrics, the CVSS base score become 7.5.
  • Mitigation:
  • Credit: This vulnerability was discovered by Stephen Roettger of the Google Security Team.
时间: 2024-10-21 02:31:24

NTP安全漏洞公告的相关文章

Apache Struts2发布漏洞公告

在jsp商城开发以及java商城开发中中通过采用JavaServlet/JSP技术,实现了基于Java EE Web应用的MVC设计模式的应用框架,是MVC经典设计模式中的一个经典产品,也是国际上应用最广泛的Web应用框架之一.java商城开发中的网上银行.政府网站.主要门户网站都大量使用Struts. 近日,Apache Struts2发布漏洞公告,声称Struts2应用框架出现一个高危漏洞.同时发布的,还有漏洞补丁包(最新版本为:2.3.15.1)和黑客攻击尝试验证代码. 经国内网站安全服务

openssh/ntp/ftp漏洞

这3种漏洞常规加固都要对应操作系统打官方漏洞升级包.既然这么说那下面就是不常规的: Openssh: 改ssh版本:whereis ssh //查看ssh目录cd 到该目录cp ssh ssh.bak //备份sshssh -V //查看ssh版本sed -i 's/OpenSSH_6.9p1/OpenSSH_7.2p2/g' ssh //修改版本,前面为当前版本,后面为最新版本ssh -V //查看核对修改版本telnet 127.0.0.1 22 //查看版本后回车cd /usr/sbin/

缓冲区溢出分析第07课:MS06-040漏洞研究——静态分析

前言 我在之前的课程中讨论过W32Dasm这款软件中的漏洞分析与利用的方法,由于使用该软件的人群毕竟是小众群体,因此该漏洞的危害相对来说还是比较小的.但是如果漏洞出现在Windows系统中,那么情况就会很不一样了.毕竟Windows统治了全球九成以上的计算机操作系统,因此如果该系统中出现了漏洞,而这个漏洞又被别有用心者所利用,那么就必然会出现数以亿计的受害者. MS06-040漏洞基本信息 这次我们讨论的漏洞是在2006年8月8日,由微软公布的MS06-040这个漏洞(https://techn

漏洞预警 | Apache Struts2 曝任意代码执行漏洞 (S2-045)

近日,Apache官方发布Apache Struts 2.3.5–2.3.31版本及2.5–2.5.10版本存在远程代码执行漏洞(CNNVD-201703-152 ,CVE-2017-5638)的紧急漏洞公告.该漏洞是由于上传功能的异常处理函数没有正确处理用户输入的错误信息,导致远程攻击者可通过发送恶意的数据包,利用该漏洞在受影响服务器上执行任意命令. 漏洞危害 攻击者可在HTTP请求头部中的Content-Type字段构造恶意代码利用该漏洞,在受影响服务器上执行系统命令,进一步可完全控制该服务

Struts2应用框架出现一个高危漏洞

在jsp商城开发中通过采用JavaServlet/JSP技术,实现了基于Java EE Web应用的MVC设计模式的应用框架,是MVC经典设计模式中的一个经典产品,也是国际上应用最广泛的Web应用框架之一.java商城开发中的网上银行.政府网站.主要门户网站都大量使用Struts. 近日,Apache Struts2发布漏洞公告,声称Struts2应用框架出现一个高危漏洞.同时发布的,还有漏洞补丁包(最新版本为:2.3.15.1)和黑客攻击尝试验证代码. 经国内网站安全服务商SCANV.COM确

从乌云的错误漏洞分析看Mifare Classic安全

前言 12年2月初国内著名安全问题反馈平台-乌云发布了有关某公司员工卡的金额效验算法破解的安全问题.从整个漏洞分析来看,漏洞的提交者把员工卡的数据分析得非常仔细,以至很多刚刚接触或者未曾接触的都纷纷赞叹.但从真实的技术角度出发来进行分析的话,从漏洞的标题以及其内部的分析和解决方案都可以看得出,乌云以及漏洞发布者完全不明白究竟哪里才是漏洞!从08年至今时隔四年,国内对于MIFARE Classic安全漏洞在著名的安全问题反馈平台却反映出了国内安全研究者的一种无知. MIFARE安全问题的由来 20

Sophos UTM WebAdmin存在未明漏洞

                                                                                                                                 www.169it.com Sophos UTM WebAdmin存在未明漏洞详情如下: CNVD-ID CNVD-2013-13101 发布时间 2013-09-18 危害级别 中 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

初学python3-爬取cnnvd漏洞信息

因为工作需要cnnvd漏洞信息,以前用着集客搜.八爪鱼之类的工具,但对其效果和速度都不满意.最近开始接触学习爬虫,作为初学者,还需要慢慢完善.先记录下第一个爬虫.还想着在多进程和IP代理方向改善学习. 这个是运行情况,速度还是无法忍受,多进程在数据获取应该能快很多,IP代理应该能忽视短时间多次访问被限制的问题,从而可以提高速度. 以下是整个代码: 1 #!/usr/bin/env python3 2 # -*- coding: utf-8 -*- 3 # by Kaiho 4 5 import

国内某厂商摄像头敏感信息泄露漏洞事件分析

国内某厂商摄像头敏感信息泄露漏洞事件分析 PDF 版报告下载: 国内某厂商摄像头敏感信息泄露事件分析English Version: Webcam Sensitive Information Disclosure Vulnerability Analysis 1. 事件概述 国内某家监控产品供应商和解决方案服务商旗下有多款监控摄像机以及相关的配套设备.2017年3月5日,知道创宇旗下漏洞平台Seebug[0]上收录了一位名为"bashis"的国外安全研究员发布了一个漏洞公告,声称该厂商