CIS CYBER SECURITY ADVISORIES
MS-ISAC CYBER SECURITY ADVISORY NUMBER:
Multiple Vulnerabilities in Network Time Protocol daemon Could Allow Remote Code Execution
Multiple vulnerabilities have been discovered in the Network Time Protocol daemon (ntpd). The Network Time Protocol daemon is a time synchronization service commonly implemented in Linux based operating systems.
Successful exploitation could result in an attacker gaining the same privileges as the ntpd process. Depending on the privileges associated with the process, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Failed exploit attempts may result in a denial-of-service condition.
At this time, these vulnerabilities have been publicly disclosed.
- ntpd versions 4.2.7 and prior
- Large and medium government entities:High
- Small government entities:High
- Large and medium business entities:High
- Small business entities:High
Three buffer overflow vulnerabilities, one insufficient entropy security weakness, one predictable random number generator weakness and one missing return on error issue have been identified in Network Time Protocol daemon (ntpd). The three buffer overflow vulnerabilities could allow remote code execution.
- One buffer overflowvulnerability exists in the crypto_recv() function that may be exploited via a specially crafted packet when the ntp.conf file contains a "crypto pw" directive. This vulnerability can be taken advantage by a remote unauthenticated attacker. (CVE-2014-9295)
- Two buffer overflow vulnerabilities exist, one in the ctl_pudata() function and one in the configure() function, that may be exploited via a specially crafted packet.These vulnerabilities can be taken advantage by a remote unauthenticated attacker.(CVE-2014-9295)
- One weak default key vulnerability exists in the config_auth() function when the "auth" key is set in the configuration file that causes the generation of default keys with low entropy. This issue may be used by an attacker to guess the generated key, and possibly use it to send ntpdc query or configuration requests. (CVE-2014-9294)
- One predictable random number generator weakness exists that causes the generation of a weak seed which is used in generating MD5 keys. This issue is located in util/ntp-keygen.c and may be used by an attacker to guess MD5 keys that could be used to spoof a NTP client or server (CVE-2014-9293)
- One missing return on error issue exists in ntp_proto.c that allows for processing to continue when a specific rare error occurs. Little is known about this issue or its effects at this time. (CVE-2014-9296)
Successful exploitation of the buffer overflow vulnerabilities could result in the attacker gaining the same rights as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
We recommend the following actions be taken:
- Update vulnerable products immediately after appropriate testing.
- Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack