Korean
<< Back
VID 23240
Severity 30
Port 123
Protocol UDP
Class NTPD
Detailed Description The NTP daemon, according its version number, is vulnerable to multiple vulnerabilities. Network Time Protocol (NTP) daemon is responsible for providing accurate time reports used for synchronizing the clocks on installed systems.

The remote NTP server is affected by an information disclosure vulnerability due to improper validation of the 'vallen' value in extension fields in 'ntp_crypto.c'. This allows a remote attacker to disclose sensitive information.

* Note: This check solely relied on the version number of the remote NTP daemon to assess this vulnerability, so this might be a false positive.

* References:
http://support.ntp.org/bin/view/Main/SecurityNotice

* Platforms Affected:
NTPD versions prior to 4.2.8p1
Any operating system Any version
Recommendation Upgrade to the latest version of NTP (4.2.8p1 or later), available from the NTP Software Downloads Web page at http://ntp.isc.org/bin/view/Main/SoftwareDownloads
Related URL CVE-2014-9297 (CVE)
Related URL 72583 (SecurityFocus)
Related URL (ISS)