Upstream information

CVE-2016-1548 at MITRE

Description

An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer->dst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.

SUSE information

CVSS v2 Scores
  National Vulnerability Database SUSE
Base Score 6.42 6.42
Vector AV:N/AC:L/Au:N/C:N/I:P/A:P AV:N/AC:L/Au:N/C:N/I:P/A:P
Access Vector Network Network
Access Complexity Low Low
Authentication None None
Confidentiality Impact None None
Integrity Impact Partial Partial
Availability Impact Partial Partial
CVSS v3 Scores
  National Vulnerability Database
Base Score 7.2
Vector AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L
Access Vector Network
Access Complexity Low
Privileges Required None
User Interaction None
Scope Changed
Confidentiality Impact None
Integrity Impact Low
Availability Impact Low
SUSE Bugzilla entries: 959243 [RESOLVED / FIXED], 977446 [RESOLVED / FIXED], 977461 [RESOLVED / FIXED], 982068 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Desktop 12
  • ntp >= 4.2.8p8-46.8.1
  • ntp-doc >= 4.2.8p8-46.8.1
Patchnames:
SUSE-SLE-DESKTOP-12-2016-933
SUSE Linux Enterprise Desktop 12 SP1
  • ntp >= 4.2.8p7-11.1
  • ntp-doc >= 4.2.8p7-11.1
Patchnames:
SUSE-SLE-DESKTOP-12-SP1-2016-764
SUSE Linux Enterprise Desktop 12 SP2
  • ntp >= 4.2.8p8-14.1
  • ntp-doc >= 4.2.8p8-14.1
Patchnames:
SUSE Linux Enterprise Desktop 12 SP2 GA ntp
SUSE Linux Enterprise Server 11 SP2-LTSS
  • ntp >= 4.2.8p7-44.1
  • ntp-doc >= 4.2.8p7-44.1
Patchnames:
slessp2-ntp-12592
SUSE Linux Enterprise Server 11 SP3-LTSS
  • ntp >= 4.2.8p7-44.1
  • ntp-doc >= 4.2.8p7-44.1
Patchnames:
slessp3-ntp-12592
SUSE Linux Enterprise Server 11 SP4
  • ntp >= 4.2.8p7-11.1
  • ntp-doc >= 4.2.8p7-11.1
Patchnames:
slessp4-ntp-12553
SUSE Linux Enterprise Server 12
  • ntp >= 4.2.8p8-46.8.1
  • ntp-doc >= 4.2.8p8-46.8.1
Patchnames:
SUSE-SLE-SERVER-12-2016-933
SUSE Linux Enterprise Server 12 SP1
  • ntp >= 4.2.8p7-11.1
  • ntp-doc >= 4.2.8p7-11.1
Patchnames:
SUSE-SLE-SERVER-12-SP1-2016-764
SUSE Linux Enterprise Server 12 SP2
  • ntp >= 4.2.8p8-14.1
  • ntp-doc >= 4.2.8p8-14.1
Patchnames:
SUSE Linux Enterprise Server 12 SP2 GA ntp
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
  • ntp >= 4.2.8p8-14.1
  • ntp-doc >= 4.2.8p8-14.1
Patchnames:
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 GA ntp
SUSE Manager 2.1
  • ntp >= 4.2.8p7-44.1
  • ntp-doc >= 4.2.8p7-44.1
Patchnames:
sleman21-ntp-12592
SUSE Manager Proxy 2.1
  • ntp >= 4.2.8p7-44.1
  • ntp-doc >= 4.2.8p7-44.1
Patchnames:
slemap21-ntp-12592
SUSE OpenStack Cloud 5
  • ntp >= 4.2.8p7-44.1
  • ntp-doc >= 4.2.8p7-44.1
Patchnames:
sleclo50sp3-ntp-12592
SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T
SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit
SUSE Linux Enterprise Server 10 SP4 LTSS for x86
  • yast2-ntp-client >= 2.13.18-0.20.1
Builds
ZYPP Patch Nr: 9295
SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T
SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit
SUSE Linux Enterprise Server 10 SP4 LTSS for x86
  • ntp >= 4.2.8p8-0.7.1
  • ntp-doc >= 4.2.8p8-0.7.1
Builds
ZYPP Patch Nr: 9293
openSUSE 13.2
  • ntp >= 4.2.8p7-25.15.1
  • ntp-debuginfo >= 4.2.8p7-25.15.1
  • ntp-debugsource >= 4.2.8p7-25.15.1
  • ntp-doc >= 4.2.8p7-25.15.1
Patchnames:
openSUSE-2016-649
openSUSE Leap 42.1
  • ntp >= 4.2.8p7-21.1
  • ntp-debuginfo >= 4.2.8p7-21.1
  • ntp-debugsource >= 4.2.8p7-21.1
  • ntp-doc >= 4.2.8p7-21.1
Patchnames:
openSUSE-2016-599
openSUSE Leap 42.2
  • ntp >= 4.2.8p8-25.1
  • ntp-doc >= 4.2.8p8-25.1
Patchnames:
openSUSE Leap 42.2 GA ntp
openSUSE Tumbleweed
  • ntp >= 4.2.8p9-1.1
  • ntp-doc >= 4.2.8p9-1.1
Patchnames:
openSUSE Tumbleweed GA ntp