Upstream information

CVE-2016-1550 at MITRE

Description

An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key.

SUSE information

CVSS v2 Scores
  National Vulnerability Database SUSE
Base Score 4.96 2.64
Vector AV:N/AC:L/Au:N/C:P/I:N/A:N AV:L/AC:H/Au:N/C:P/I:P/A:N
Access Vector Network Local
Access Complexity Low High
Authentication None None
Confidentiality Impact Partial Partial
Integrity Impact None Partial
Availability Impact None None
CVSS v3 Scores
  National Vulnerability Database
Base Score 5.3
Vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Access Vector Network
Access Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Impact Low
Integrity Impact None
Availability Impact None
SUSE Bugzilla entries: 977446 [RESOLVED / FIXED], 977464 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Desktop 12
  • ntp >= 4.2.8p8-46.8.1
  • ntp-doc >= 4.2.8p8-46.8.1
Patchnames:
SUSE-SLE-DESKTOP-12-2016-933
SUSE Linux Enterprise Desktop 12 SP1
  • ntp >= 4.2.8p7-11.1
  • ntp-doc >= 4.2.8p7-11.1
Patchnames:
SUSE-SLE-DESKTOP-12-SP1-2016-764
SUSE Linux Enterprise Desktop 12 SP2
  • ntp >= 4.2.8p8-14.1
  • ntp-doc >= 4.2.8p8-14.1
Patchnames:
SUSE Linux Enterprise Desktop 12 SP2 GA ntp
SUSE Linux Enterprise Server 11 SP2-LTSS
  • ntp >= 4.2.8p7-44.1
  • ntp-doc >= 4.2.8p7-44.1
Patchnames:
slessp2-ntp-12592
SUSE Linux Enterprise Server 11 SP3-LTSS
  • ntp >= 4.2.8p7-44.1
  • ntp-doc >= 4.2.8p7-44.1
Patchnames:
slessp3-ntp-12592
SUSE Linux Enterprise Server 11 SP4
  • ntp >= 4.2.8p7-11.1
  • ntp-doc >= 4.2.8p7-11.1
Patchnames:
slessp4-ntp-12553
SUSE Linux Enterprise Server 12
  • ntp >= 4.2.8p8-46.8.1
  • ntp-doc >= 4.2.8p8-46.8.1
Patchnames:
SUSE-SLE-SERVER-12-2016-933
SUSE Linux Enterprise Server 12 SP1
  • ntp >= 4.2.8p7-11.1
  • ntp-doc >= 4.2.8p7-11.1
Patchnames:
SUSE-SLE-SERVER-12-SP1-2016-764
SUSE Linux Enterprise Server 12 SP2
  • ntp >= 4.2.8p8-14.1
  • ntp-doc >= 4.2.8p8-14.1
Patchnames:
SUSE Linux Enterprise Server 12 SP2 GA ntp
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
  • ntp >= 4.2.8p8-14.1
  • ntp-doc >= 4.2.8p8-14.1
Patchnames:
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 GA ntp
SUSE Manager 2.1
  • ntp >= 4.2.8p7-44.1
  • ntp-doc >= 4.2.8p7-44.1
Patchnames:
sleman21-ntp-12592
SUSE Manager Proxy 2.1
  • ntp >= 4.2.8p7-44.1
  • ntp-doc >= 4.2.8p7-44.1
Patchnames:
slemap21-ntp-12592
SUSE OpenStack Cloud 5
  • ntp >= 4.2.8p7-44.1
  • ntp-doc >= 4.2.8p7-44.1
Patchnames:
sleclo50sp3-ntp-12592
SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T
SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit
SUSE Linux Enterprise Server 10 SP4 LTSS for x86
  • yast2-ntp-client >= 2.13.18-0.20.1
Builds
ZYPP Patch Nr: 9295
SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T
SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit
SUSE Linux Enterprise Server 10 SP4 LTSS for x86
  • ntp >= 4.2.8p8-0.7.1
  • ntp-doc >= 4.2.8p8-0.7.1
Builds
ZYPP Patch Nr: 9293
openSUSE 13.2
  • ntp >= 4.2.8p7-25.15.1
  • ntp-debuginfo >= 4.2.8p7-25.15.1
  • ntp-debugsource >= 4.2.8p7-25.15.1
  • ntp-doc >= 4.2.8p7-25.15.1
Patchnames:
openSUSE-2016-649
openSUSE Leap 42.1
  • ntp >= 4.2.8p7-21.1
  • ntp-debuginfo >= 4.2.8p7-21.1
  • ntp-debugsource >= 4.2.8p7-21.1
  • ntp-doc >= 4.2.8p7-21.1
Patchnames:
openSUSE-2016-599
openSUSE Leap 42.2
  • ntp >= 4.2.8p8-25.1
  • ntp-doc >= 4.2.8p8-25.1
Patchnames:
openSUSE Leap 42.2 GA ntp
openSUSE Tumbleweed
  • ntp >= 4.2.8p9-1.1
  • ntp-doc >= 4.2.8p9-1.1
Patchnames:
openSUSE Tumbleweed GA ntp