VID |
23143 |
Severity |
30 |
Port |
123 |
Protocol |
UDP |
Class |
NTPD |
Detailed Description |
The NTP daemon, according its version number, is vulnerable to an insecure privileges vulnerability. Network Time Protocol (NTP) daemon is responsible for providing accurate time reports used for synchronizing the clocks on installed systems. NTPD versions prior to 4.2.0b could allow a local attacker to cause the NTPD to run with different privileges than intended, caused due to an error when the group name is specified with the "-u" command line option. A local attacker could exploit this vulnerability to run NTPD with their "gid" rather than with permissions of the "gid" of the group.
* Note: This check solely relied on the version number of the remote NTP daemon to assess this vulnerability, so this might be a false positive.
* References: https://ntp.isc.org/bugs/show_bug.cgi?id=392 http://secunia.com/advisories/16602/ http://www.frsirt.com/english/advisories/2005/1561 http://www.debian.org/security/2005/dsa-801 http://www.mandriva.com/security/advisories?name=MDKSA-2005:156 http://www.redhat.com/archives/fedora-announce-list/2005-August/msg00119.html
* Platforms Affected: NTPD versions prior to 4.2.0b Any operating system Any version |
Recommendation |
Upgrade to the latest version of NTP (4.2.0b or later), available from the NTP Software Downloads Web page at http://ntp.isc.org/bin/view/Main/SoftwareDownloads |
Related URL |
CVE-2005-2496 (CVE) |
Related URL |
14673 (SecurityFocus) |
Related URL |
22035 (ISS) |
|