Документ взят из кэша поисковой машины. Адрес
оригинального документа
: http://theory.sinp.msu.ru/pipermail/ru-ngi/2015q1/001487.html
Дата изменения: Thu Jan 15 15:29:15 2015 Дата индексирования: Sun Apr 10 18:10:26 2016 Кодировка: |
FYI -------- Forwarded Message -------- Subject: [Noc-managers] [Heads up][ EGI SVG/CSIRT] [EGI-ADV-20150105] EGI CSIRT alert 'High' Risk - CVE-2014-9295 - Remote code execution in NTP - [EGI-ADV-20150106] Date: Wed, 07 Jan 2015 17:39:30 +0100 From: Sven Gabriel <sveng at nikhef.nl> To: site-security-contacts at mailman.egi.eu, ngi-security-contacts at mailman.egi.eu CC: noc-managers at mailman.egi.eu, svg-rat at mailman.egi.eu, csirt at mailman.egi.eu ** WHITE information - Unlimited distribution allowed ** ** see https://wiki.egi.eu/wiki/EGI_CSIRT:TLP for distribution restrictions ** Title: EGI CSIRT alert 'High' Risk - CVE-2014-9295 - Remote code execution in NTP - [EGI-ADV-20150106] Date: 2015-01-07 Updated: URL: https://wiki.egi.eu/wiki/EGI_CSIRT:Alerts/Ntp-2015-01-06 Introduction ============ A security notice has been made by NTP [R 1] describing various vulnerabilities, including remote code execution. This vulnerability is not exploitable in the default configuration of NTP. This has been resolved, and sites are recommended to update. In particular, sites are recommended to ensure they do not have the combination of a vulnerable version of NTP and configuration which allows the vulnerability to be exploited. Details ======= A remote attacker can send a carefully crafted packet that can overflow a stack buffer and potentially allow malicious code to be executed with the privilege level of the ntpd process. This is exploitable when Autokey Authentication is enabled (i.e. the ntp.conf file contains a 'crypto pw ...' directive). More info is available on the ntp page [R 1] NVD page [R 2] and the NTP site [R 3] Risk category ============= This issue has been assessed as 'High' the EGI CSIRT and EGI SVG Risk Assessment Team Affected software ================= This has been fixed in NTP version to 4.2.8. Earlier versions are likely to be vulnerable. Mitigation ========== This is not exploitable in the default configuration of NTP. Component installation information ================================== Sites should upgrade to NTP version 4.2.8 or later. Updates are available for the following RHEL-compatibles - CentOS, http://lists.centos.org/pipermail/centos-announce/2014-December/020852.html and http://lists.centos.org/pipermail/centos-announce/2014-December/020851.html - RedHat, https://rhn.redhat.com/errata/RHSA-2014-2024.html and https://rhn.redhat.com/errata/RHSA-2014-2025.html - Scientific Linux, https://www.scientificlinux.org/sl-errata/slsa-20142024-1/ and https://www.scientificlinux.org/sl-errata/slsa-20142025-1/ Recommendations =============== Sites are recommended to update relevant components if they have not done so already, and in particular to check that they do not have the combination of a vulnerable component and the configuration which exposes the vulnerability. Credit ====== CSIRT and SVG were alerted to this vulnerability by Leif Nixon. References ========== [R 1] NTP site http://support.ntp.org/bin/view/Main/SecurityNotice [R 2] https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9295 [R 3] Redhat Notice https://bugzilla.redhat.com/show_bug.cgi?id=1176037#c11 Timeline ======== Yyyy-mm-dd 2014-12-19 EGI CSIRT and SVG alerted to this Vulnerability by Leif Nixon. 2014-12-19 Agreed not critical for EGI, therefore no urgent action. 2015-01-05 Agreed it needs risk assessing in EGI IRTF meeting. 2015-01-05 Assessment by the EGI Software Vulnerability Group/CSIRT agreed as 'High' and that alert/advisory should be sent. 2015-01-06 Alert issued. On behalf of the EGI CSIRT, Sven Gabriel -- ======== Sven Gabriel Nikhef, Dutch National Institute for Sub-atomic Physics Group Computer Technology / Room: H1.59 Phone: +31 20 5925103 Science Park 105 / 1098 XG Amsterdam / The Netherlands -- A.Kryukov, PhD Head of laboratory, SINP MSU Phone: +7 495 939-3156 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 490 bytes Desc: not available URL: <http://theory.sinp.msu.ru/pipermail/ru-ngi/attachments/20150107/a67eaccd/attachment.sig> -------------- next part -------------- _______________________________________________ Noc-managers mailing list Noc-managers at mailman.egi.eu https://mailman.egi.eu/mailman/listinfo/noc-managers