Executive Summary
Summary | |
---|---|
Title | New ntp packages fix group id confusion |
Informations | |||
---|---|---|---|
Name | DSA-801 | First vendor Publication | 2005-09-05 |
Vendor | Debian | Last vendor Modification | 2005-09-05 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 4.6 | Attack Range | Local |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
SuSE developers discovered that ntp confuses the given group id with the group id of the given user when called with a group id on the commandline that is specified as a string and not as a numeric gid, which causes ntpd to run with different privileges than intended. The old stable distribution (woody) is not affected by this problem. For the stable distribution (sarge) this problem has been fixed in version 4.2.0a+stable-2sarge1. The unstable distribution (sid) is not affected by this problem. We recommend that you upgrade your ntp-server package. |
Original Source
Url : http://www.debian.org/security/2005/dsa-801 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:9669 | |||
Oval ID: | oval:org.mitre.oval:def:9669 | ||
Title: | The xntpd ntp (ntpd) daemon before 4.2.0b, when run with the -u option and using a string to specify the group, uses the group ID of the user instead of the group, which causes xntpd to run with different privileges than intended. | ||
Description: | The xntpd ntp (ntpd) daemon before 4.2.0b, when run with the -u option and using a string to specify the group, uses the group ID of the user instead of the group, which causes xntpd to run with different privileges than intended. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2005-2496 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 801-1 (ntp) File : nvt/deb_801_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
19055 | NTP ntpd -u Group Permission Weakness |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-08-30 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2006-0393.nasl - Type : ACT_GATHER_INFO |
2006-08-14 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2006-0393.nasl - Type : ACT_GATHER_INFO |
2006-01-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-175-1.nasl - Type : ACT_GATHER_INFO |
2005-09-17 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-812.nasl - Type : ACT_GATHER_INFO |
2005-09-06 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-801.nasl - Type : ACT_GATHER_INFO |
2005-08-29 | Name : The remote NTP server is affected by a privilege escalation vulnerability. File : ntp_incorrect_group_privs.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:34:19 |
|