Korean
<< Back
VID 23248
Severity 30
Port 123
Protocol UDP
Class NTPD
Detailed Description The NTP daemon, according its version number, is vulnerable to multiple vulnerabilities. Network Time Protocol (NTP) daemon is responsible for providing accurate time reports used for synchronizing the clocks on installed systems. The remote NTP daemon has the 'monlist' command enabled. This command returns a list of recent hosts that have connected to the service. As such, it can be used for network reconnaissance or, along with a spoofed source IP, a distributed denial of service attack.

* Note: This check solely relied on the version number of the remote NTP daemon to assess this vulnerability, so this might be a false positive.

* References:
https://isc.sans.edu/diary/NTP+reflection+attack/17300
http://bugs.ntp.org/show_bug.cgi?id=1532

* Platforms Affected:
NTPD versions prior to 4.2.7p26
Any operating system Any version
Recommendation Upgrade to the latest version of NTP (4.2.7p26 or later), available from the NTP Software Downloads Web page at http://ntp.isc.org/bin/view/Main/SoftwareDownloads
Related URL CVE-2013-5211 (CVE)
Related URL 64692 (SecurityFocus)
Related URL (ISS)