Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.703154 |
Kategorie: | Debian Local Security Checks |
Titel: | Debian Security Advisory DSA 3154-1 (ntp - security update) |
Zusammenfassung: | Several vulnerabilities were;discovered in the ntp package, an implementation of the Network Time Protocol.;The Common Vulnerabilities and Exposures project identifies the following;problems:;;CVE-2014-9297;Stephen Roettger of the Google Security Team, Sebastian Krahmer of;the SUSE Security Team and Harlan Stenn of Network Time Foundation;discovered that the length value in extension fields is not properly;validated in several code paths in ntp_crypto.c, which could lead to;information leakage or denial of service (ntpd crash).;;CVE-2014-9298;Stephen Roettger of the Google Security Team reported that ACLs;based on IPv6 ::1 addresses can be bypassed. |
Beschreibung: | Summary: Several vulnerabilities were discovered in the ntp package, an implementation of the Network Time Protocol. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2014-9297 Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service (ntpd crash). CVE-2014-9298 Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 addresses can be bypassed. Affected Software/OS: ntp on Debian Linux Solution: For the stable distribution (wheezy), these problems have been fixed in version 1:4.2.6.p5+dfsg-2+deb7u2. For the unstable distribution (sid), these problems have been fixed in version 1:4.2.6.p5+dfsg-4. We recommend that you upgrade your ntp packages. CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2014-9297 Common Vulnerability Exposure (CVE) ID: CVE-2014-9298 |
Copyright | Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |