oval:org.mitre.oval:def:28483

Definition Id: oval:org.mitre.oval:def:28483
 
Oval ID: oval:org.mitre.oval:def:28483
Title: RHSA-2014:2024 -- ntp security update (Important)
Description: The Network Time Protocol (NTP) is used to synchronize a computer's time with a referenced time source. Multiple buffer overflow flaws were discovered in ntpd's crypto_recv(), ctl_putdata(), and configure() functions. A remote attacker could use either of these flaws to send a specially crafted request packet that could crash ntpd or, potentially, execute arbitrary code with the privileges of the ntp user. Note: the crypto_recv() flaw requires non-default configurations to be active, while the ctl_putdata() flaw, by default, can only be exploited via local attackers, and the configure() flaw requires additional authentication to exploit. (CVE-2014-9295) It was found that ntpd automatically generated weak keys for its internal use if no ntpdc request authentication key was specified in the ntp.conf configuration file. A remote attacker able to match the configured IP restrictions could guess the generated key, and possibly use it to send ntpdc query or configuration requests. (CVE-2014-9293) It was found that ntp-keygen used a weak method for generating MD5 keys. This could possibly allow an attacker to guess generated MD5 keys that could then be used to spoof an NTP client or server. Note: it is recommended to regenerate any MD5 keys that had explicitly been generated with ntp-keygen; the default installation does not contain such keys). (CVE-2014-9294) A missing return statement in the receive() function could potentially allow a remote attacker to bypass NTP's authentication mechanism. (CVE-2014-9296) All ntp users are advised to upgrade to this updated package, which contains backported patches to resolve these issues. After installing the update, the ntpd daemon will restart automatically.
Family: unix Class: patch
Reference(s): RHSA-2014:2024
CESA-2014:2024-CentOS 7
CESA-2014:2024-CentOS 6
CVE-2014-9293
CVE-2014-9294
CVE-2014-9295
CVE-2014-9296
Version: 7
Platform(s): Red Hat Enterprise Linux 6
Red Hat Enterprise Linux 7
CentOS Linux 7
CentOS Linux 6
Product(s): ntp
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:20273
 
Oval ID: oval:org.mitre.oval:def:20273
Title: The operating system installed on the system is Red Hat Enterprise Linux 6
Description: The operating system installed on the system is Red Hat Enterprise Linux 6.
Family: unix Class: inventory
Reference(s): cpe:/o:redhat:enterprise_linux:6
Version: 6
Platform(s): Red Hat Enterprise Linux 6
Product(s):
Definition Synopsis:
Referenced By:
oval:org.mitre.oval:def:28483
Definition Id: oval:org.mitre.oval:def:16337
 
Oval ID: oval:org.mitre.oval:def:16337
Title: The operating system installed on the system is CentOS Linux 6.x
Description: The operating system installed on the system is CentOS Linux 6.x
Family: unix Class: inventory
Reference(s): cpe:/o:centos:centos:6
Version: 5
Platform(s): CentOS Linux 6
Product(s):
Definition Synopsis:
Referenced By:
oval:org.mitre.oval:def:28483
Definition Id: oval:org.mitre.oval:def:24773
 
Oval ID: oval:org.mitre.oval:def:24773
Title: The operating system installed on the system is CentOS Linux 7.x
Description: The operating system installed on the system is CentOS Linux 7.x
Family: unix Class: inventory
Reference(s): cpe:/o:centos:centos:7
Version: 3
Platform(s): CentOS Linux 7
Product(s):
Definition Synopsis:
Referenced By:
oval:org.mitre.oval:def:28483
Definition Id: oval:org.mitre.oval:def:24953
 
Oval ID: oval:org.mitre.oval:def:24953
Title: The operating system installed on the system is Red Hat Enterprise Linux 7
Description: The operating system installed on the system is Red Hat Enterprise Linux 7.
Family: unix Class: inventory
Reference(s): cpe:/o:redhat:enterprise_linux:7
Version: 3
Platform(s): Red Hat Enterprise Linux 7
Product(s):
Definition Synopsis:
Referenced By:
oval:org.mitre.oval:def:28483