HackDig : Dig high-quality web security articles for hacker

Critical #NTP Vulnerability in ntpd prior to 4.2.8, (Sat, Dec 20th)

2014-12-20 02:05

The Google security team discovered several vulnerabilities in current NTP implementations, one of whichcan lead to arbitrary code execution [1][2]. NTP servers prior to version 4.2.8 are affected.

There are some rumors about active exploitation of at least some of the vulnerabilities Google discovered.

Make sure to patch all publicly reachable NTP implementations as fast as possible.

Mitigating Circumstances:

Try to block inbound connections to ntp servers who do not have to be publicly reachable. However, be aware that simple statefull firewalls may not track UDP connections correctly and will allow access to internal NTP servers from any external IP if the NTP server recently established an outbound connection.

ntpd typically does not have to run as root. Most Unix/Linux versions will configure NTP using a lower privileged users.

According to the advisory at ntp.org, you can also:

Disable Autokey Authentication by removing, or commenting out, all configuration directives beginning with thecryptokeyword in yourntp.conf">A few Ubuntu and CentOS systems I tested, as well as OS X systems, do not seem to use autokey.

[1]http://www.kb.cert.org/vuls/id/852879
[2]">In the NTP code, a section of code is missing a return, and the resulting error indicates processing did not stop.

---
Johannes B. Ullrich, Ph.D.
STI|Twitter|LinkedIn

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.


Source: ssr;pma&39091=diyrots?lmth.yraid/ude.snas.csi

Read:2294 | Comments:0 | Tags: Vulnerability

“Critical #NTP Vulnerability in ntpd prior to 4.2.8, (Sat, Dec 20th)”0 Comments

Submit A Comment

Name:

Email:

Blog :

Verification Code:

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud