Summary
Check the version of ntp
Solution
Please Install the Updated Packages.
Insight
The network timeservice ntp was updated to fix critical security issues (bnc#910764, CERT VU#852879)
* A potential remote code execution problem was found inside ntpd. The functions crypto_recv() (when using autokey authentication), ctl_putdata(), and configure() where updated to avoid buffer overflows that could be exploited. (CVE-2014-9295)
* Furthermore a problem inside the ntpd error handling was found that is missing a return statement. This could also lead to a potentially attack vector. (CVE-2014-9296)
Affected
ntp on openSUSE 13.1, openSUSE 12.3
Detection
Get the installed version with the help
of detect NVT and check if the version is vulnerable or not.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2014-9295, CVE-2014-9296 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities