Upstream information

CVE-2016-1551 at MITRE

Description

ntpd in NTP 4.2.8p3 and NTPsec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 relies on the underlying operating system to protect it from requests that impersonate reference clocks. Because reference clocks are treated like other peers and stored in the same structure, any packet with a source ip address of a reference clock (127.127.1.1 for example) that reaches the receive() function will match that reference clock's peer record and will be treated as a trusted peer. Any system that lacks the typical martian packet filtering which would block these packets is in danger of having its time controlled by an attacker.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database SUSE
Base Score 2.6 2.6
Vector AV:N/AC:H/Au:N/C:N/I:P/A:N AV:N/AC:H/Au:N/C:N/I:P/A:N
Access Vector Network Network
Access Complexity High High
Authentication None None
Confidentiality Impact None None
Integrity Impact Partial Partial
Availability Impact None None
CVSS v3 Scores
  National Vulnerability Database
Base Score 3.7
Vector AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
Access Vector Network
Access Complexity High
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Impact None
Integrity Impact Low
Availability Impact None
SUSE Bugzilla entries: 977446 [RESOLVED / FIXED], 977450 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Desktop 12
  • ntp >= 4.2.8p8-46.8.1
  • ntp-doc >= 4.2.8p8-46.8.1
Patchnames:
SUSE-SLE-DESKTOP-12-2016-933
SUSE Linux Enterprise Desktop 12 SP1
  • ntp >= 4.2.8p7-11.1
  • ntp-doc >= 4.2.8p7-11.1
Patchnames:
SUSE-SLE-DESKTOP-12-SP1-2016-764
SUSE Linux Enterprise Desktop 12 SP2
  • ntp >= 4.2.8p8-14.1
  • ntp-doc >= 4.2.8p8-14.1
Patchnames:
SUSE Linux Enterprise Desktop 12 SP2 GA ntp
SUSE Linux Enterprise Desktop 12 SP3
  • ntp >= 4.2.8p10-63.3
  • ntp-doc >= 4.2.8p10-63.3
Patchnames:
SUSE Linux Enterprise Desktop 12 SP3 GA ntp
SUSE Linux Enterprise Server 11 SP2-LTSS
  • ntp >= 4.2.8p7-44.1
  • ntp-doc >= 4.2.8p7-44.1
Patchnames:
slessp2-ntp-12592
SUSE Linux Enterprise Server 11 SP3-LTSS
  • ntp >= 4.2.8p7-44.1
  • ntp-doc >= 4.2.8p7-44.1
Patchnames:
slessp3-ntp-12592
SUSE Linux Enterprise Server 11 SP4
  • ntp >= 4.2.8p7-11.1
  • ntp-doc >= 4.2.8p7-11.1
Patchnames:
slessp4-ntp-12553
SUSE Linux Enterprise Server 12
  • ntp >= 4.2.8p8-46.8.1
  • ntp-doc >= 4.2.8p8-46.8.1
Patchnames:
SUSE-SLE-SERVER-12-2016-933
SUSE Linux Enterprise Server 12 SP1
  • ntp >= 4.2.8p7-11.1
  • ntp-doc >= 4.2.8p7-11.1
Patchnames:
SUSE-SLE-SERVER-12-SP1-2016-764
SUSE Linux Enterprise Server 12 SP2
  • ntp >= 4.2.8p8-14.1
  • ntp-doc >= 4.2.8p8-14.1
Patchnames:
SUSE Linux Enterprise Server 12 SP2 GA ntp
SUSE Linux Enterprise Server 12 SP3
  • ntp >= 4.2.8p10-63.3
  • ntp-doc >= 4.2.8p10-63.3
Patchnames:
SUSE Linux Enterprise Server 12 SP3 GA ntp
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
  • ntp >= 4.2.8p8-14.1
  • ntp-doc >= 4.2.8p8-14.1
Patchnames:
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 GA ntp
SUSE Manager 2.1
  • ntp >= 4.2.8p7-44.1
  • ntp-doc >= 4.2.8p7-44.1
Patchnames:
sleman21-ntp-12592
SUSE Manager Proxy 2.1
  • ntp >= 4.2.8p7-44.1
  • ntp-doc >= 4.2.8p7-44.1
Patchnames:
slemap21-ntp-12592
SUSE OpenStack Cloud 5
  • ntp >= 4.2.8p7-44.1
  • ntp-doc >= 4.2.8p7-44.1
Patchnames:
sleclo50sp3-ntp-12592
SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T
SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit
SUSE Linux Enterprise Server 10 SP4 LTSS for x86
  • yast2-ntp-client >= 2.13.18-0.20.1
Builds
ZYPP Patch Nr: 9295
SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T
SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit
SUSE Linux Enterprise Server 10 SP4 LTSS for x86
  • ntp >= 4.2.8p8-0.7.1
  • ntp-doc >= 4.2.8p8-0.7.1
Builds
ZYPP Patch Nr: 9293
openSUSE Leap 42.1
  • ntp >= 4.2.8p7-21.1
  • ntp-debuginfo >= 4.2.8p7-21.1
  • ntp-debugsource >= 4.2.8p7-21.1
  • ntp-doc >= 4.2.8p7-21.1
Patchnames:
openSUSE-2016-599
openSUSE Leap 42.2
  • ntp >= 4.2.8p8-25.1
  • ntp-doc >= 4.2.8p8-25.1
Patchnames:
openSUSE Leap 42.2 GA ntp
openSUSE Leap 42.3
  • ntp >= 4.2.8p10-30.1
  • ntp-doc >= 4.2.8p10-30.1
Patchnames:
openSUSE Leap 42.3 GA ntp
openSUSE Tumbleweed
  • ntp >= 4.2.8p9-1.1
  • ntp-doc >= 4.2.8p9-1.1
Patchnames:
openSUSE Tumbleweed GA ntp


Status of this issue by product and package

Product(s) Source package State
SUSE Linux Enterprise Desktop 11 SP2 ntp Released
SUSE Linux Enterprise Desktop 11 SP3 ntp Released
SUSE Linux Enterprise Desktop 11 SP4 ntp Released
SUSE Linux Enterprise Desktop 12 GA ntp Released
SUSE Linux Enterprise Desktop 12 SP1 ntp Released
SUSE Linux Enterprise Server 11 SP1 LTSS ntp Released
SUSE Linux Enterprise Server 11 SP2 ntp Released
SUSE Linux Enterprise Server 11 SP2 LTSS ntp Released
SUSE Linux Enterprise Server 11 SP3 ntp Released
SUSE Linux Enterprise Server 11 SP3 LTSS ntp Released
SUSE Linux Enterprise Server 11 SP4 ntp Released
SUSE Linux Enterprise Server 12 GA ntp Released
SUSE Linux Enterprise Server 12 SP1 ntp Released
SUSE Linux Enterprise Server for SAP 11 SP2 ntp Released