12b15cb3dSCy Schubert--- 2*a25439b6SCy SchubertNTP 4.2.8p2 (Harlan Stenn <stenn@ntp.org>, 2015/04/xx) 3*a25439b6SCy Schubert 4*a25439b6SCy SchubertFocus: Security and Bug fixes, enhancements. 5*a25439b6SCy Schubert 6*a25439b6SCy SchubertSeverity: MEDIUM 7*a25439b6SCy Schubert 8*a25439b6SCy SchubertIn addition to bug fixes and enhancements, this release fixes the 9*a25439b6SCy Schubertfollowing medium-severity vulnerabilities involving private key 10*a25439b6SCy Schubertauthentication: 11*a25439b6SCy Schubert 12*a25439b6SCy Schubert* [Sec 2779] ntpd accepts unauthenticated packets with symmetric key crypto. 13*a25439b6SCy Schubert 14*a25439b6SCy Schubert References: Sec 2779 / CVE-2015-1798 / VU#374268 15*a25439b6SCy Schubert Affects: All NTP4 releases starting with ntp-4.2.5p99 up to but not 16*a25439b6SCy Schubert including ntp-4.2.8p2 where the installation uses symmetric keys 17*a25439b6SCy Schubert to authenticate remote associations. 18*a25439b6SCy Schubert CVSS: (AV:A/AC:M/Au:N/C:P/I:P/A:P) Base Score: 5.4 19*a25439b6SCy Schubert Date Resolved: Stable (4.2.8p2) 07 Apr 2015 20*a25439b6SCy Schubert Summary: When ntpd is configured to use a symmetric key to authenticate 21*a25439b6SCy Schubert a remote NTP server/peer, it checks if the NTP message 22*a25439b6SCy Schubert authentication code (MAC) in received packets is valid, but not if 23*a25439b6SCy Schubert there actually is any MAC included. Packets without a MAC are 24*a25439b6SCy Schubert accepted as if they had a valid MAC. This allows a MITM attacker to 25*a25439b6SCy Schubert send false packets that are accepted by the client/peer without 26*a25439b6SCy Schubert having to know the symmetric key. The attacker needs to know the 27*a25439b6SCy Schubert transmit timestamp of the client to match it in the forged reply 28*a25439b6SCy Schubert and the false reply needs to reach the client before the genuine 29*a25439b6SCy Schubert reply from the server. The attacker doesn't necessarily need to be 30*a25439b6SCy Schubert relaying the packets between the client and the server. 31*a25439b6SCy Schubert 32*a25439b6SCy Schubert Authentication using autokey doesn't have this problem as there is 33*a25439b6SCy Schubert a check that requires the key ID to be larger than NTP_MAXKEY, 34*a25439b6SCy Schubert which fails for packets without a MAC. 35*a25439b6SCy Schubert Mitigation: 36*a25439b6SCy Schubert Upgrade to 4.2.8p2, or later, from the NTP Project Download Page 37*a25439b6SCy Schubert or the NTP Public Services Project Download Page 38*a25439b6SCy Schubert Configure ntpd with enough time sources and monitor it properly. 39*a25439b6SCy Schubert Credit: This issue was discovered by Miroslav Lichvar, of Red Hat. 40*a25439b6SCy Schubert 41*a25439b6SCy Schubert* [Sec 2781] Authentication doesn't protect symmetric associations against 42*a25439b6SCy Schubert DoS attacks. 43*a25439b6SCy Schubert 44*a25439b6SCy Schubert References: Sec 2781 / CVE-2015-1799 / VU#374268 45*a25439b6SCy Schubert Affects: All NTP releases starting with at least xntp3.3wy up to but 46*a25439b6SCy Schubert not including ntp-4.2.8p2 where the installation uses symmetric 47*a25439b6SCy Schubert key authentication. 48*a25439b6SCy Schubert CVSS: (AV:A/AC:M/Au:N/C:P/I:P/A:P) Base Score: 5.4 49*a25439b6SCy Schubert Note: the CVSS base Score for this issue could be 4.3 or lower, and 50*a25439b6SCy Schubert it could be higher than 5.4. 51*a25439b6SCy Schubert Date Resolved: Stable (4.2.8p2) 07 Apr 2015 52*a25439b6SCy Schubert Summary: An attacker knowing that NTP hosts A and B are peering with 53*a25439b6SCy Schubert each other (symmetric association) can send a packet to host A 54*a25439b6SCy Schubert with source address of B which will set the NTP state variables 55*a25439b6SCy Schubert on A to the values sent by the attacker. Host A will then send 56*a25439b6SCy Schubert on its next poll to B a packet with originate timestamp that 57*a25439b6SCy Schubert doesn't match the transmit timestamp of B and the packet will 58*a25439b6SCy Schubert be dropped. If the attacker does this periodically for both 59*a25439b6SCy Schubert hosts, they won't be able to synchronize to each other. This is 60*a25439b6SCy Schubert a known denial-of-service attack, described at 61*a25439b6SCy Schubert https://www.eecis.udel.edu/~mills/onwire.html . 62*a25439b6SCy Schubert 63*a25439b6SCy Schubert According to the document the NTP authentication is supposed to 64*a25439b6SCy Schubert protect symmetric associations against this attack, but that 65*a25439b6SCy Schubert doesn't seem to be the case. The state variables are updated even 66*a25439b6SCy Schubert when authentication fails and the peers are sending packets with 67*a25439b6SCy Schubert originate timestamps that don't match the transmit timestamps on 68*a25439b6SCy Schubert the receiving side. 69*a25439b6SCy Schubert 70*a25439b6SCy Schubert This seems to be a very old problem, dating back to at least 71*a25439b6SCy Schubert xntp3.3wy. It's also in the NTPv3 (RFC 1305) and NTPv4 (RFC 5905) 72*a25439b6SCy Schubert specifications, so other NTP implementations with support for 73*a25439b6SCy Schubert symmetric associations and authentication may be vulnerable too. 74*a25439b6SCy Schubert An update to the NTP RFC to correct this error is in-process. 75*a25439b6SCy Schubert Mitigation: 76*a25439b6SCy Schubert Upgrade to 4.2.8p2, or later, from the NTP Project Download Page 77*a25439b6SCy Schubert or the NTP Public Services Project Download Page 78*a25439b6SCy Schubert Note that for users of autokey, this specific style of MITM attack 79*a25439b6SCy Schubert is simply a long-known potential problem. 80*a25439b6SCy Schubert Configure ntpd with appropriate time sources and monitor ntpd. 81*a25439b6SCy Schubert Alert your staff if problems are detected. 82*a25439b6SCy Schubert Credit: This issue was discovered by Miroslav Lichvar, of Red Hat. 83*a25439b6SCy Schubert 84*a25439b6SCy Schubert* New script: update-leap 85*a25439b6SCy SchubertThe update-leap script will verify and if necessary, update the 86*a25439b6SCy Schubertleap-second definition file. 87*a25439b6SCy SchubertIt requires the following commands in order to work: 88*a25439b6SCy Schubert 89*a25439b6SCy Schubert wget logger tr sed shasum 90*a25439b6SCy Schubert 91*a25439b6SCy SchubertSome may choose to run this from cron. It needs more portability testing. 92*a25439b6SCy Schubert 93*a25439b6SCy SchubertBug Fixes and Improvements: 94*a25439b6SCy Schubert 95*a25439b6SCy Schubert* [Bug 1787] DCF77's formerly "antenna" bit is "call bit" since 2003. 96*a25439b6SCy Schubert* [Bug 1960] setsockopt IPV6_MULTICAST_IF: Invalid argument. 97*a25439b6SCy Schubert* [Bug 2346] "graceful termination" signals do not do peer cleanup. 98*a25439b6SCy Schubert* [Bug 2728] See if C99-style structure initialization works. 99*a25439b6SCy Schubert* [Bug 2747] Upgrade libevent to 2.1.5-beta. 100*a25439b6SCy Schubert* [Bug 2749] ntp/lib/NTP/Util.pm needs update for ntpq -w, IPv6, .POOL. . 101*a25439b6SCy Schubert* [Bug 2751] jitter.h has stale copies of l_fp macros. 102*a25439b6SCy Schubert* [Bug 2756] ntpd hangs in startup with gcc 3.3.5 on ARM. 103*a25439b6SCy Schubert* [Bug 2757] Quiet compiler warnings. 104*a25439b6SCy Schubert* [Bug 2759] Expose nonvolatile/clk_wander_threshold to ntpq. 105*a25439b6SCy Schubert* [Bug 2763] Allow different thresholds for forward and backward steps. 106*a25439b6SCy Schubert* [Bug 2766] ntp-keygen output files should not be world-readable. 107*a25439b6SCy Schubert* [Bug 2767] ntp-keygen -M should symlink to ntp.keys. 108*a25439b6SCy Schubert* [Bug 2771] nonvolatile value is documented in wrong units. 109*a25439b6SCy Schubert* [Bug 2773] Early leap announcement from Palisade/Thunderbolt 110*a25439b6SCy Schubert* [Bug 2774] Unreasonably verbose printout - leap pending/warning 111*a25439b6SCy Schubert* [Bug 2775] ntp-keygen.c fails to compile under Windows. 112*a25439b6SCy Schubert* [Bug 2777] Fixed loops and decoding of Meinberg GPS satellite info. 113*a25439b6SCy Schubert Removed non-ASCII characters from some copyright comments. 114*a25439b6SCy Schubert Removed trailing whitespace. 115*a25439b6SCy Schubert Updated definitions for Meinberg clocks from current Meinberg header files. 116*a25439b6SCy Schubert Now use C99 fixed-width types and avoid non-ASCII characters in comments. 117*a25439b6SCy Schubert Account for updated definitions pulled from Meinberg header files. 118*a25439b6SCy Schubert Updated comments on Meinberg GPS receivers which are not only called GPS16x. 119*a25439b6SCy Schubert Replaced some constant numbers by defines from ntp_calendar.h 120*a25439b6SCy Schubert Modified creation of parse-specific variables for Meinberg devices 121*a25439b6SCy Schubert in gps16x_message(). 122*a25439b6SCy Schubert Reworked mk_utcinfo() to avoid printing of ambiguous leap second dates. 123*a25439b6SCy Schubert Modified mbg_tm_str() which now expexts an additional parameter controlling 124*a25439b6SCy Schubert if the time status shall be printed. 125*a25439b6SCy Schubert* [Sec 2779] ntpd accepts unauthenticated packets with symmetric key crypto. 126*a25439b6SCy Schubert* [Sec 2781] Authentication doesn't protect symmetric associations against 127*a25439b6SCy Schubert DoS attacks. 128*a25439b6SCy Schubert* [Bug 2783] Quiet autoconf warnings about missing AC_LANG_SOURCE. 129*a25439b6SCy Schubert* [Bug 2789] Quiet compiler warnings from libevent. 130*a25439b6SCy Schubert* [Bug 2790] If ntpd sets the Windows MM timer highest resolution 131*a25439b6SCy Schubert pause briefly before measuring system clock precision to yield 132*a25439b6SCy Schubert correct results. 133*a25439b6SCy Schubert* Comment from Juergen Perlinger in ntp_calendar.c to make the code clearer. 134*a25439b6SCy Schubert* Use predefined function types for parse driver functions 135*a25439b6SCy Schubert used to set up function pointers. 136*a25439b6SCy Schubert Account for changed prototype of parse_inp_fnc_t functions. 137*a25439b6SCy Schubert Cast parse conversion results to appropriate types to avoid 138*a25439b6SCy Schubert compiler warnings. 139*a25439b6SCy Schubert Let ioctl() for Windows accept a (void *) to avoid compiler warnings 140*a25439b6SCy Schubert when called with pointers to different types. 141*a25439b6SCy Schubert 142*a25439b6SCy Schubert--- 1432b15cb3dSCy SchubertNTP 4.2.8p1 (Harlan Stenn <stenn@ntp.org>, 2015/02/04) 1442b15cb3dSCy Schubert 1452b15cb3dSCy SchubertFocus: Security and Bug fixes, enhancements. 1462b15cb3dSCy Schubert 1472b15cb3dSCy SchubertSeverity: HIGH 1482b15cb3dSCy Schubert 1492b15cb3dSCy SchubertIn addition to bug fixes and enhancements, this release fixes the 1502b15cb3dSCy Schubertfollowing high-severity vulnerabilities: 1512b15cb3dSCy Schubert 1522b15cb3dSCy Schubert* vallen is not validated in several places in ntp_crypto.c, leading 1532b15cb3dSCy Schubert to a potential information leak or possibly a crash 1542b15cb3dSCy Schubert 1552b15cb3dSCy Schubert References: Sec 2671 / CVE-2014-9297 / VU#852879 1562b15cb3dSCy Schubert Affects: All NTP4 releases before 4.2.8p1 that are running autokey. 1572b15cb3dSCy Schubert CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5 1582b15cb3dSCy Schubert Date Resolved: Stable (4.2.8p1) 04 Feb 2015 1592b15cb3dSCy Schubert Summary: The vallen packet value is not validated in several code 1602b15cb3dSCy Schubert paths in ntp_crypto.c which can lead to information leakage 1612b15cb3dSCy Schubert or perhaps a crash of the ntpd process. 1622b15cb3dSCy Schubert Mitigation - any of: 1632b15cb3dSCy Schubert Upgrade to 4.2.8p1, or later, from the NTP Project Download Page 1642b15cb3dSCy Schubert or the NTP Public Services Project Download Page. 1652b15cb3dSCy Schubert Disable Autokey Authentication by removing, or commenting out, 1662b15cb3dSCy Schubert all configuration directives beginning with the "crypto" 1672b15cb3dSCy Schubert keyword in your ntp.conf file. 1682b15cb3dSCy Schubert Credit: This vulnerability was discovered by Stephen Roettger of the 1692b15cb3dSCy Schubert Google Security Team, with additional cases found by Sebastian 1702b15cb3dSCy Schubert Krahmer of the SUSE Security Team and Harlan Stenn of Network 1712b15cb3dSCy Schubert Time Foundation. 1722b15cb3dSCy Schubert 1732b15cb3dSCy Schubert* ::1 can be spoofed on some OSes, so ACLs based on IPv6 ::1 addresses 1742b15cb3dSCy Schubert can be bypassed. 1752b15cb3dSCy Schubert 1762b15cb3dSCy Schubert References: Sec 2672 / CVE-2014-9298 / VU#852879 1772b15cb3dSCy Schubert Affects: All NTP4 releases before 4.2.8p1, under at least some 1782b15cb3dSCy Schubert versions of MacOS and Linux. *BSD has not been seen to be vulnerable. 1792b15cb3dSCy Schubert CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:C) Base Score: 9 1802b15cb3dSCy Schubert Date Resolved: Stable (4.2.8p1) 04 Feb 2014 1812b15cb3dSCy Schubert Summary: While available kernels will prevent 127.0.0.1 addresses 1822b15cb3dSCy Schubert from "appearing" on non-localhost IPv4 interfaces, some kernels 1832b15cb3dSCy Schubert do not offer the same protection for ::1 source addresses on 1842b15cb3dSCy Schubert IPv6 interfaces. Since NTP's access control is based on source 1852b15cb3dSCy Schubert address and localhost addresses generally have no restrictions, 1862b15cb3dSCy Schubert an attacker can send malicious control and configuration packets 1872b15cb3dSCy Schubert by spoofing ::1 addresses from the outside. Note Well: This is 1882b15cb3dSCy Schubert not really a bug in NTP, it's a problem with some OSes. If you 1892b15cb3dSCy Schubert have one of these OSes where ::1 can be spoofed, ALL ::1 -based 1902b15cb3dSCy Schubert ACL restrictions on any application can be bypassed! 1912b15cb3dSCy Schubert Mitigation: 1922b15cb3dSCy Schubert Upgrade to 4.2.8p1, or later, from the NTP Project Download Page 1932b15cb3dSCy Schubert or the NTP Public Services Project Download Page 1942b15cb3dSCy Schubert Install firewall rules to block packets claiming to come from 1952b15cb3dSCy Schubert ::1 from inappropriate network interfaces. 1962b15cb3dSCy Schubert Credit: This vulnerability was discovered by Stephen Roettger of 1972b15cb3dSCy Schubert the Google Security Team. 1982b15cb3dSCy Schubert 1992b15cb3dSCy SchubertAdditionally, over 30 bugfixes and improvements were made to the codebase. 2002b15cb3dSCy SchubertSee the ChangeLog for more information. 2012b15cb3dSCy Schubert 2022b15cb3dSCy Schubert--- 2032b15cb3dSCy SchubertNTP 4.2.8 (Harlan Stenn <stenn@ntp.org>, 2014/12/18) 2042b15cb3dSCy Schubert 2052b15cb3dSCy SchubertFocus: Security and Bug fixes, enhancements. 2062b15cb3dSCy Schubert 2072b15cb3dSCy SchubertSeverity: HIGH 2082b15cb3dSCy Schubert 2092b15cb3dSCy SchubertIn addition to bug fixes and enhancements, this release fixes the 2102b15cb3dSCy Schubertfollowing high-severity vulnerabilities: 2112b15cb3dSCy Schubert 2122b15cb3dSCy Schubert************************** vv NOTE WELL vv ***************************** 2132b15cb3dSCy Schubert 2142b15cb3dSCy SchubertThe vulnerabilities listed below can be significantly mitigated by 2152b15cb3dSCy Schubertfollowing the BCP of putting 2162b15cb3dSCy Schubert 2172b15cb3dSCy Schubert restrict default ... noquery 2182b15cb3dSCy Schubert 2192b15cb3dSCy Schubertin the ntp.conf file. With the exception of: 2202b15cb3dSCy Schubert 2212b15cb3dSCy Schubert receive(): missing return on error 2222b15cb3dSCy Schubert References: Sec 2670 / CVE-2014-9296 / VU#852879 2232b15cb3dSCy Schubert 2242b15cb3dSCy Schubertbelow (which is a limited-risk vulnerability), none of the recent 2252b15cb3dSCy Schubertvulnerabilities listed below can be exploited if the source IP is 2262b15cb3dSCy Schubertrestricted from sending a 'query'-class packet by your ntp.conf file. 2272b15cb3dSCy Schubert 2282b15cb3dSCy Schubert************************** ^^ NOTE WELL ^^ ***************************** 2292b15cb3dSCy Schubert 2302b15cb3dSCy Schubert* Weak default key in config_auth(). 2312b15cb3dSCy Schubert 2322b15cb3dSCy Schubert References: [Sec 2665] / CVE-2014-9293 / VU#852879 2332b15cb3dSCy Schubert CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3 2342b15cb3dSCy Schubert Vulnerable Versions: all releases prior to 4.2.7p11 2352b15cb3dSCy Schubert Date Resolved: 28 Jan 2010 2362b15cb3dSCy Schubert 2372b15cb3dSCy Schubert Summary: If no 'auth' key is set in the configuration file, ntpd 2382b15cb3dSCy Schubert would generate a random key on the fly. There were two 2392b15cb3dSCy Schubert problems with this: 1) the generated key was 31 bits in size, 2402b15cb3dSCy Schubert and 2) it used the (now weak) ntp_random() function, which was 2412b15cb3dSCy Schubert seeded with a 32-bit value and could only provide 32 bits of 2422b15cb3dSCy Schubert entropy. This was sufficient back in the late 1990s when the 2432b15cb3dSCy Schubert code was written. Not today. 2442b15cb3dSCy Schubert 2452b15cb3dSCy Schubert Mitigation - any of: 2462b15cb3dSCy Schubert - Upgrade to 4.2.7p11 or later. 2472b15cb3dSCy Schubert - Follow BCP and put 'restrict ... noquery' in your ntp.conf file. 2482b15cb3dSCy Schubert 2492b15cb3dSCy Schubert Credit: This vulnerability was noticed in ntp-4.2.6 by Neel Mehta 2502b15cb3dSCy Schubert of the Google Security Team. 2512b15cb3dSCy Schubert 2522b15cb3dSCy Schubert* Non-cryptographic random number generator with weak seed used by 2532b15cb3dSCy Schubert ntp-keygen to generate symmetric keys. 2542b15cb3dSCy Schubert 2552b15cb3dSCy Schubert References: [Sec 2666] / CVE-2014-9294 / VU#852879 2562b15cb3dSCy Schubert CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3 2572b15cb3dSCy Schubert Vulnerable Versions: All NTP4 releases before 4.2.7p230 2582b15cb3dSCy Schubert Date Resolved: Dev (4.2.7p230) 01 Nov 2011 2592b15cb3dSCy Schubert 2602b15cb3dSCy Schubert Summary: Prior to ntp-4.2.7p230 ntp-keygen used a weak seed to 2612b15cb3dSCy Schubert prepare a random number generator that was of good quality back 2622b15cb3dSCy Schubert in the late 1990s. The random numbers produced was then used to 2632b15cb3dSCy Schubert generate symmetric keys. In ntp-4.2.8 we use a current-technology 2642b15cb3dSCy Schubert cryptographic random number generator, either RAND_bytes from 2652b15cb3dSCy Schubert OpenSSL, or arc4random(). 2662b15cb3dSCy Schubert 2672b15cb3dSCy Schubert Mitigation - any of: 2682b15cb3dSCy Schubert - Upgrade to 4.2.7p230 or later. 2692b15cb3dSCy Schubert - Follow BCP and put 'restrict ... noquery' in your ntp.conf file. 2702b15cb3dSCy Schubert 2712b15cb3dSCy Schubert Credit: This vulnerability was discovered in ntp-4.2.6 by 2722b15cb3dSCy Schubert Stephen Roettger of the Google Security Team. 2732b15cb3dSCy Schubert 2742b15cb3dSCy Schubert* Buffer overflow in crypto_recv() 2752b15cb3dSCy Schubert 2762b15cb3dSCy Schubert References: Sec 2667 / CVE-2014-9295 / VU#852879 2772b15cb3dSCy Schubert CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5 2782b15cb3dSCy Schubert Versions: All releases before 4.2.8 2792b15cb3dSCy Schubert Date Resolved: Stable (4.2.8) 18 Dec 2014 2802b15cb3dSCy Schubert 2812b15cb3dSCy Schubert Summary: When Autokey Authentication is enabled (i.e. the ntp.conf 2822b15cb3dSCy Schubert file contains a 'crypto pw ...' directive) a remote attacker 2832b15cb3dSCy Schubert can send a carefully crafted packet that can overflow a stack 2842b15cb3dSCy Schubert buffer and potentially allow malicious code to be executed 2852b15cb3dSCy Schubert with the privilege level of the ntpd process. 2862b15cb3dSCy Schubert 2872b15cb3dSCy Schubert Mitigation - any of: 2882b15cb3dSCy Schubert - Upgrade to 4.2.8, or later, or 2892b15cb3dSCy Schubert - Disable Autokey Authentication by removing, or commenting out, 2902b15cb3dSCy Schubert all configuration directives beginning with the crypto keyword 2912b15cb3dSCy Schubert in your ntp.conf file. 2922b15cb3dSCy Schubert 2932b15cb3dSCy Schubert Credit: This vulnerability was discovered by Stephen Roettger of the 2942b15cb3dSCy Schubert Google Security Team. 2952b15cb3dSCy Schubert 2962b15cb3dSCy Schubert* Buffer overflow in ctl_putdata() 2972b15cb3dSCy Schubert 2982b15cb3dSCy Schubert References: Sec 2668 / CVE-2014-9295 / VU#852879 2992b15cb3dSCy Schubert CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5 3002b15cb3dSCy Schubert Versions: All NTP4 releases before 4.2.8 3012b15cb3dSCy Schubert Date Resolved: Stable (4.2.8) 18 Dec 2014 3022b15cb3dSCy Schubert 3032b15cb3dSCy Schubert Summary: A remote attacker can send a carefully crafted packet that 3042b15cb3dSCy Schubert can overflow a stack buffer and potentially allow malicious 3052b15cb3dSCy Schubert code to be executed with the privilege level of the ntpd process. 3062b15cb3dSCy Schubert 3072b15cb3dSCy Schubert Mitigation - any of: 3082b15cb3dSCy Schubert - Upgrade to 4.2.8, or later. 3092b15cb3dSCy Schubert - Follow BCP and put 'restrict ... noquery' in your ntp.conf file. 3102b15cb3dSCy Schubert 3112b15cb3dSCy Schubert Credit: This vulnerability was discovered by Stephen Roettger of the 3122b15cb3dSCy Schubert Google Security Team. 3132b15cb3dSCy Schubert 3142b15cb3dSCy Schubert* Buffer overflow in configure() 3152b15cb3dSCy Schubert 3162b15cb3dSCy Schubert References: Sec 2669 / CVE-2014-9295 / VU#852879 3172b15cb3dSCy Schubert CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5 3182b15cb3dSCy Schubert Versions: All NTP4 releases before 4.2.8 3192b15cb3dSCy Schubert Date Resolved: Stable (4.2.8) 18 Dec 2014 3202b15cb3dSCy Schubert 3212b15cb3dSCy Schubert Summary: A remote attacker can send a carefully crafted packet that 3222b15cb3dSCy Schubert can overflow a stack buffer and potentially allow malicious 3232b15cb3dSCy Schubert code to be executed with the privilege level of the ntpd process. 3242b15cb3dSCy Schubert 3252b15cb3dSCy Schubert Mitigation - any of: 3262b15cb3dSCy Schubert - Upgrade to 4.2.8, or later. 3272b15cb3dSCy Schubert - Follow BCP and put 'restrict ... noquery' in your ntp.conf file. 3282b15cb3dSCy Schubert 3292b15cb3dSCy Schubert Credit: This vulnerability was discovered by Stephen Roettger of the 3302b15cb3dSCy Schubert Google Security Team. 3312b15cb3dSCy Schubert 3322b15cb3dSCy Schubert* receive(): missing return on error 3332b15cb3dSCy Schubert 3342b15cb3dSCy Schubert References: Sec 2670 / CVE-2014-9296 / VU#852879 3352b15cb3dSCy Schubert CVSS: (AV:N/AC:L/Au:N/C:N/I:N/A:P) Base Score: 5.0 3362b15cb3dSCy Schubert Versions: All NTP4 releases before 4.2.8 3372b15cb3dSCy Schubert Date Resolved: Stable (4.2.8) 18 Dec 2014 3382b15cb3dSCy Schubert 3392b15cb3dSCy Schubert Summary: Code in ntp_proto.c:receive() was missing a 'return;' in 3402b15cb3dSCy Schubert the code path where an error was detected, which meant 3412b15cb3dSCy Schubert processing did not stop when a specific rare error occurred. 3422b15cb3dSCy Schubert We haven't found a way for this bug to affect system integrity. 3432b15cb3dSCy Schubert If there is no way to affect system integrity the base CVSS 3442b15cb3dSCy Schubert score for this bug is 0. If there is one avenue through which 3452b15cb3dSCy Schubert system integrity can be partially affected, the base score 3462b15cb3dSCy Schubert becomes a 5. If system integrity can be partially affected 3472b15cb3dSCy Schubert via all three integrity metrics, the CVSS base score become 7.5. 3482b15cb3dSCy Schubert 3492b15cb3dSCy Schubert Mitigation - any of: 3502b15cb3dSCy Schubert - Upgrade to 4.2.8, or later, 3512b15cb3dSCy Schubert - Remove or comment out all configuration directives 3522b15cb3dSCy Schubert beginning with the crypto keyword in your ntp.conf file. 3532b15cb3dSCy Schubert 3542b15cb3dSCy Schubert Credit: This vulnerability was discovered by Stephen Roettger of the 3552b15cb3dSCy Schubert Google Security Team. 3562b15cb3dSCy Schubert 3572b15cb3dSCy SchubertSee http://support.ntp.org/security for more information. 3582b15cb3dSCy Schubert 3592b15cb3dSCy SchubertNew features / changes in this release: 3602b15cb3dSCy Schubert 3612b15cb3dSCy SchubertImportant Changes 3622b15cb3dSCy Schubert 3632b15cb3dSCy Schubert* Internal NTP Era counters 3642b15cb3dSCy Schubert 3652b15cb3dSCy SchubertThe internal counters that track the "era" (range of years) we are in 3662b15cb3dSCy Schubertrolls over every 136 years'. The current "era" started at the stroke of 3672b15cb3dSCy Schubertmidnight on 1 Jan 1900, and ends just before the stroke of midnight on 3682b15cb3dSCy Schubert1 Jan 2036. 3692b15cb3dSCy SchubertIn the past, we have used the "midpoint" of the range to decide which 3702b15cb3dSCy Schubertera we were in. Given the longevity of some products, it became clear 3712b15cb3dSCy Schubertthat it would be more functional to "look back" less, and "look forward" 3722b15cb3dSCy Schubertmore. We now compile a timestamp into the ntpd executable and when we 3732b15cb3dSCy Schubertget a timestamp we us the "built-on" to tell us what era we are in. 3742b15cb3dSCy SchubertThis check "looks back" 10 years, and "looks forward" 126 years. 3752b15cb3dSCy Schubert 3762b15cb3dSCy Schubert* ntpdc responses disabled by default 3772b15cb3dSCy Schubert 3782b15cb3dSCy SchubertDave Hart writes: 3792b15cb3dSCy Schubert 3802b15cb3dSCy SchubertFor a long time, ntpq and its mostly text-based mode 6 (control) 3812b15cb3dSCy Schubertprotocol have been preferred over ntpdc and its mode 7 (private 3822b15cb3dSCy Schubertrequest) protocol for runtime queries and configuration. There has 3832b15cb3dSCy Schubertbeen a goal of deprecating ntpdc, previously held back by numerous 3842b15cb3dSCy Schubertcapabilities exposed by ntpdc with no ntpq equivalent. I have been 3852b15cb3dSCy Schubertadding commands to ntpq to cover these cases, and I believe I've 3862b15cb3dSCy Schubertcovered them all, though I've not compared command-by-command 3872b15cb3dSCy Schubertrecently. 3882b15cb3dSCy Schubert 3892b15cb3dSCy SchubertAs I've said previously, the binary mode 7 protocol involves a lot of 3902b15cb3dSCy Schuberthand-rolled structure layout and byte-swapping code in both ntpd and 3912b15cb3dSCy Schubertntpdc which is hard to get right. As ntpd grows and changes, the 3922b15cb3dSCy Schubertchanges are difficult to expose via ntpdc while maintaining forward 3932b15cb3dSCy Schubertand backward compatibility between ntpdc and ntpd. In contrast, 3942b15cb3dSCy Schubertntpq's text-based, label=value approach involves more code reuse and 3952b15cb3dSCy Schubertallows compatible changes without extra work in most cases. 3962b15cb3dSCy Schubert 3972b15cb3dSCy SchubertMode 7 has always been defined as vendor/implementation-specific while 3982b15cb3dSCy Schubertmode 6 is described in RFC 1305 and intended to be open to interoperate 3992b15cb3dSCy Schubertwith other implementations. There is an early draft of an updated 4002b15cb3dSCy Schubertmode 6 description that likely will join the other NTPv4 RFCs 4012b15cb3dSCy Schuberteventually. (http://tools.ietf.org/html/draft-odonoghue-ntpv4-control-01) 4022b15cb3dSCy Schubert 4032b15cb3dSCy SchubertFor these reasons, ntpd 4.2.7p230 by default disables processing of 4042b15cb3dSCy Schubertntpdc queries, reducing ntpd's attack surface and functionally 4052b15cb3dSCy Schubertdeprecating ntpdc. If you are in the habit of using ntpdc for certain 4062b15cb3dSCy Schubertoperations, please try the ntpq equivalent. If there's no equivalent, 4072b15cb3dSCy Schubertplease open a bug report at http://bugs.ntp.org./ 4082b15cb3dSCy Schubert 4092b15cb3dSCy SchubertIn addition to the above, over 1100 issues have been resolved between 4102b15cb3dSCy Schubertthe 4.2.6 branch and 4.2.8. The ChangeLog file in the distribution 4112b15cb3dSCy Schubertlists these. 4122b15cb3dSCy Schubert 4132b15cb3dSCy Schubert--- 4142b15cb3dSCy SchubertNTP 4.2.6p5 (Harlan Stenn <stenn@ntp.org>, 2011/12/24) 4152b15cb3dSCy Schubert 4162b15cb3dSCy SchubertFocus: Bug fixes 4172b15cb3dSCy Schubert 4182b15cb3dSCy SchubertSeverity: Medium 4192b15cb3dSCy Schubert 4202b15cb3dSCy SchubertThis is a recommended upgrade. 4212b15cb3dSCy Schubert 4222b15cb3dSCy SchubertThis release updates sys_rootdisp and sys_jitter calculations to match the 4232b15cb3dSCy SchubertRFC specification, fixes a potential IPv6 address matching error for the 4242b15cb3dSCy Schubert"nic" and "interface" configuration directives, suppresses the creation of 4252b15cb3dSCy Schubertextraneous ephemeral associations for certain broadcastclient and 4262b15cb3dSCy Schubertmulticastclient configurations, cleans up some ntpq display issues, and 4272b15cb3dSCy Schubertincludes improvements to orphan mode, minor bugs fixes and code clean-ups. 4282b15cb3dSCy Schubert 4292b15cb3dSCy SchubertNew features / changes in this release: 4302b15cb3dSCy Schubert 4312b15cb3dSCy Schubertntpd 4322b15cb3dSCy Schubert 4332b15cb3dSCy Schubert * Updated "nic" and "interface" IPv6 address handling to prevent 4342b15cb3dSCy Schubert mismatches with localhost [::1] and wildcard [::] which resulted from 4352b15cb3dSCy Schubert using the address/prefix format (e.g. fe80::/64) 4362b15cb3dSCy Schubert * Fix orphan mode stratum incorrectly counting to infinity 4372b15cb3dSCy Schubert * Orphan parent selection metric updated to includes missing ntohl() 4382b15cb3dSCy Schubert * Non-printable stratum 16 refid no longer sent to ntp 4392b15cb3dSCy Schubert * Duplicate ephemeral associations suppressed for broadcastclient and 4402b15cb3dSCy Schubert multicastclient without broadcastdelay 4412b15cb3dSCy Schubert * Exclude undetermined sys_refid from use in loopback TEST12 4422b15cb3dSCy Schubert * Exclude MODE_SERVER responses from KoD rate limiting 4432b15cb3dSCy Schubert * Include root delay in clock_update() sys_rootdisp calculations 4442b15cb3dSCy Schubert * get_systime() updated to exclude sys_residual offset (which only 4452b15cb3dSCy Schubert affected bits "below" sys_tick, the precision threshold) 4462b15cb3dSCy Schubert * sys.peer jitter weighting corrected in sys_jitter calculation 4472b15cb3dSCy Schubert 4482b15cb3dSCy Schubertntpq 4492b15cb3dSCy Schubert 4502b15cb3dSCy Schubert * -n option extended to include the billboard "server" column 4512b15cb3dSCy Schubert * IPv6 addresses in the local column truncated to prevent overruns 4522b15cb3dSCy Schubert 4532b15cb3dSCy Schubert--- 4542b15cb3dSCy SchubertNTP 4.2.6p4 (Harlan Stenn <stenn@ntp.org>, 2011/09/22) 4552b15cb3dSCy Schubert 4562b15cb3dSCy SchubertFocus: Bug fixes and portability improvements 4572b15cb3dSCy Schubert 4582b15cb3dSCy SchubertSeverity: Medium 4592b15cb3dSCy Schubert 4602b15cb3dSCy SchubertThis is a recommended upgrade. 4612b15cb3dSCy Schubert 4622b15cb3dSCy SchubertThis release includes build infrastructure updates, code 4632b15cb3dSCy Schubertclean-ups, minor bug fixes, fixes for a number of minor 4642b15cb3dSCy Schubertref-clock issues, and documentation revisions. 4652b15cb3dSCy Schubert 4662b15cb3dSCy SchubertPortability improvements affect AIX, HP-UX, Linux, OS X and 64-bit time_t. 4672b15cb3dSCy Schubert 4682b15cb3dSCy SchubertNew features / changes in this release: 4692b15cb3dSCy Schubert 4702b15cb3dSCy SchubertBuild system 4712b15cb3dSCy Schubert 4722b15cb3dSCy Schubert* Fix checking for struct rtattr 4732b15cb3dSCy Schubert* Update config.guess and config.sub for AIX 4742b15cb3dSCy Schubert* Upgrade required version of autogen and libopts for building 4752b15cb3dSCy Schubert from our source code repository 4762b15cb3dSCy Schubert 4772b15cb3dSCy Schubertntpd 4782b15cb3dSCy Schubert 4792b15cb3dSCy Schubert* Back-ported several fixes for Coverity warnings from ntp-dev 4802b15cb3dSCy Schubert* Fix a rare boundary condition in UNLINK_EXPR_SLIST() 4812b15cb3dSCy Schubert* Allow "logconfig =allall" configuration directive 4822b15cb3dSCy Schubert* Bind tentative IPv6 addresses on Linux 4832b15cb3dSCy Schubert* Correct WWVB/Spectracom driver to timestamp CR instead of LF 4842b15cb3dSCy Schubert* Improved tally bit handling to prevent incorrect ntpq peer status reports 4852b15cb3dSCy Schubert* Exclude the Undisciplined Local Clock and ACTS drivers from the initial 4862b15cb3dSCy Schubert candidate list unless they are designated a "prefer peer" 4872b15cb3dSCy Schubert* Prevent the consideration of Undisciplined Local Clock or ACTS drivers for 4882b15cb3dSCy Schubert selection during the 'tos orphanwait' period 4892b15cb3dSCy Schubert* Prefer an Orphan Mode Parent over the Undisciplined Local Clock or ACTS 4902b15cb3dSCy Schubert drivers 4912b15cb3dSCy Schubert* Improved support of the Parse Refclock trusttime flag in Meinberg mode 4922b15cb3dSCy Schubert* Back-port utility routines from ntp-dev: mprintf(), emalloc_zero() 4932b15cb3dSCy Schubert* Added the NTPD_TICKADJ_PPM environment variable for specifying baseline 4942b15cb3dSCy Schubert clock slew on Microsoft Windows 4952b15cb3dSCy Schubert* Code cleanup in libntpq 4962b15cb3dSCy Schubert 4972b15cb3dSCy Schubertntpdc 4982b15cb3dSCy Schubert 4992b15cb3dSCy Schubert* Fix timerstats reporting 5002b15cb3dSCy Schubert 5012b15cb3dSCy Schubertntpdate 5022b15cb3dSCy Schubert 5032b15cb3dSCy Schubert* Reduce time required to set clock 5042b15cb3dSCy Schubert* Allow a timeout greater than 2 seconds 5052b15cb3dSCy Schubert 5062b15cb3dSCy Schubertsntp 5072b15cb3dSCy Schubert 5082b15cb3dSCy Schubert* Backward incompatible command-line option change: 5092b15cb3dSCy Schubert -l/--filelog changed -l/--logfile (to be consistent with ntpd) 5102b15cb3dSCy Schubert 5112b15cb3dSCy SchubertDocumentation 5122b15cb3dSCy Schubert 5132b15cb3dSCy Schubert* Update html2man. Fix some tags in the .html files 5142b15cb3dSCy Schubert* Distribute ntp-wait.html 5152b15cb3dSCy Schubert 5162b15cb3dSCy Schubert--- 5172b15cb3dSCy SchubertNTP 4.2.6p3 (Harlan Stenn <stenn@ntp.org>, 2011/01/03) 5182b15cb3dSCy Schubert 5192b15cb3dSCy SchubertFocus: Bug fixes and portability improvements 5202b15cb3dSCy Schubert 5212b15cb3dSCy SchubertSeverity: Medium 5222b15cb3dSCy Schubert 5232b15cb3dSCy SchubertThis is a recommended upgrade. 5242b15cb3dSCy Schubert 5252b15cb3dSCy SchubertThis release includes build infrastructure updates, code 5262b15cb3dSCy Schubertclean-ups, minor bug fixes, fixes for a number of minor 5272b15cb3dSCy Schubertref-clock issues, and documentation revisions. 5282b15cb3dSCy Schubert 5292b15cb3dSCy SchubertPortability improvements in this release affect AIX, Atari FreeMiNT, 5302b15cb3dSCy SchubertFreeBSD4, Linux and Microsoft Windows. 5312b15cb3dSCy Schubert 5322b15cb3dSCy SchubertNew features / changes in this release: 5332b15cb3dSCy Schubert 5342b15cb3dSCy SchubertBuild system 5352b15cb3dSCy Schubert* Use lsb_release to get information about Linux distributions. 5362b15cb3dSCy Schubert* 'test' is in /usr/bin (instead of /bin) on some systems. 5372b15cb3dSCy Schubert* Basic sanity checks for the ChangeLog file. 5382b15cb3dSCy Schubert* Source certain build files with ./filename for systems without . in PATH. 5392b15cb3dSCy Schubert* IRIX portability fix. 5402b15cb3dSCy Schubert* Use a single copy of the "libopts" code. 5412b15cb3dSCy Schubert* autogen/libopts upgrade. 5422b15cb3dSCy Schubert* configure.ac m4 quoting cleanup. 5432b15cb3dSCy Schubert 5442b15cb3dSCy Schubertntpd 5452b15cb3dSCy Schubert* Do not bind to IN6_IFF_ANYCAST addresses. 5462b15cb3dSCy Schubert* Log the reason for exiting under Windows. 5472b15cb3dSCy Schubert* Multicast fixes for Windows. 5482b15cb3dSCy Schubert* Interpolation fixes for Windows. 5492b15cb3dSCy Schubert* IPv4 and IPv6 Multicast fixes. 5502b15cb3dSCy Schubert* Manycast solicitation fixes and general repairs. 5512b15cb3dSCy Schubert* JJY refclock cleanup. 5522b15cb3dSCy Schubert* NMEA refclock improvements. 5532b15cb3dSCy Schubert* Oncore debug message cleanup. 5542b15cb3dSCy Schubert* Palisade refclock now builds under Linux. 5552b15cb3dSCy Schubert* Give RAWDCF more baud rates. 5562b15cb3dSCy Schubert* Support Truetime Satellite clocks under Windows. 5572b15cb3dSCy Schubert* Support Arbiter 1093C Satellite clocks under Windows. 5582b15cb3dSCy Schubert* Make sure that the "filegen" configuration command defaults to "enable". 5592b15cb3dSCy Schubert* Range-check the status codes (plus other cleanup) in the RIPE-NCC driver. 5602b15cb3dSCy Schubert* Prohibit 'includefile' directive in remote configuration command. 5612b15cb3dSCy Schubert* Fix 'nic' interface bindings. 5622b15cb3dSCy Schubert* Fix the way we link with openssl if openssl is installed in the base 5632b15cb3dSCy Schubert system. 5642b15cb3dSCy Schubert 5652b15cb3dSCy Schubertntp-keygen 5662b15cb3dSCy Schubert* Fix -V coredump. 5672b15cb3dSCy Schubert* OpenSSL version display cleanup. 5682b15cb3dSCy Schubert 5692b15cb3dSCy Schubertntpdc 5702b15cb3dSCy Schubert* Many counters should be treated as unsigned. 5712b15cb3dSCy Schubert 5722b15cb3dSCy Schubertntpdate 5732b15cb3dSCy Schubert* Do not ignore replies with equal receive and transmit timestamps. 5742b15cb3dSCy Schubert 5752b15cb3dSCy Schubertntpq 5762b15cb3dSCy Schubert* libntpq warning cleanup. 5772b15cb3dSCy Schubert 5782b15cb3dSCy Schubertntpsnmpd 5792b15cb3dSCy Schubert* Correct SNMP type for "precision" and "resolution". 5802b15cb3dSCy Schubert* Update the MIB from the draft version to RFC-5907. 5812b15cb3dSCy Schubert 5822b15cb3dSCy Schubertsntp 5832b15cb3dSCy Schubert* Display timezone offset when showing time for sntp in the local 5842b15cb3dSCy Schubert timezone. 5852b15cb3dSCy Schubert* Pay proper attention to RATE KoD packets. 5862b15cb3dSCy Schubert* Fix a miscalculation of the offset. 5872b15cb3dSCy Schubert* Properly parse empty lines in the key file. 5882b15cb3dSCy Schubert* Logging cleanup. 5892b15cb3dSCy Schubert* Use tv_usec correctly in set_time(). 5902b15cb3dSCy Schubert* Documentation cleanup. 5912b15cb3dSCy Schubert 5922b15cb3dSCy Schubert--- 5932b15cb3dSCy SchubertNTP 4.2.6p2 (Harlan Stenn <stenn@ntp.org>, 2010/07/08) 5942b15cb3dSCy Schubert 5952b15cb3dSCy SchubertFocus: Bug fixes and portability improvements 5962b15cb3dSCy Schubert 5972b15cb3dSCy SchubertSeverity: Medium 5982b15cb3dSCy Schubert 5992b15cb3dSCy SchubertThis is a recommended upgrade. 6002b15cb3dSCy Schubert 6012b15cb3dSCy SchubertThis release includes build infrastructure updates, code 6022b15cb3dSCy Schubertclean-ups, minor bug fixes, fixes for a number of minor 6032b15cb3dSCy Schubertref-clock issues, improved KOD handling, OpenSSL related 6042b15cb3dSCy Schubertupdates and documentation revisions. 6052b15cb3dSCy Schubert 6062b15cb3dSCy SchubertPortability improvements in this release affect Irix, Linux, 6072b15cb3dSCy SchubertMac OS, Microsoft Windows, OpenBSD and QNX6 6082b15cb3dSCy Schubert 6092b15cb3dSCy SchubertNew features / changes in this release: 6102b15cb3dSCy Schubert 6112b15cb3dSCy Schubertntpd 6122b15cb3dSCy Schubert* Range syntax for the trustedkey configuration directive 6132b15cb3dSCy Schubert* Unified IPv4 and IPv6 restrict lists 6142b15cb3dSCy Schubert 6152b15cb3dSCy Schubertntpdate 6162b15cb3dSCy Schubert* Rate limiting and KOD handling 6172b15cb3dSCy Schubert 6182b15cb3dSCy Schubertntpsnmpd 6192b15cb3dSCy Schubert* default connection to net-snmpd via a unix-domain socket 6202b15cb3dSCy Schubert* command-line 'socket name' option 6212b15cb3dSCy Schubert 6222b15cb3dSCy Schubertntpq / ntpdc 6232b15cb3dSCy Schubert* support for the "passwd ..." syntax 6242b15cb3dSCy Schubert* key-type specific password prompts 6252b15cb3dSCy Schubert 6262b15cb3dSCy Schubertsntp 6272b15cb3dSCy Schubert* MD5 authentication of an ntpd 6282b15cb3dSCy Schubert* Broadcast and crypto 6292b15cb3dSCy Schubert* OpenSSL support 6302b15cb3dSCy Schubert 6312b15cb3dSCy Schubert--- 6322b15cb3dSCy SchubertNTP 4.2.6p1 (Harlan Stenn <stenn@ntp.org>, 2010/04/09) 6332b15cb3dSCy Schubert 6342b15cb3dSCy SchubertFocus: Bug fixes, portability fixes, and documentation improvements 6352b15cb3dSCy Schubert 6362b15cb3dSCy SchubertSeverity: Medium 6372b15cb3dSCy Schubert 6382b15cb3dSCy SchubertThis is a recommended upgrade. 6392b15cb3dSCy Schubert 6402b15cb3dSCy Schubert--- 6412b15cb3dSCy SchubertNTP 4.2.6 (Harlan Stenn <stenn@ntp.org>, 2009/12/08) 6422b15cb3dSCy Schubert 6432b15cb3dSCy SchubertFocus: enhancements and bug fixes. 6442b15cb3dSCy Schubert 6452b15cb3dSCy Schubert--- 646eb6d21b4SOllivier RobertNTP 4.2.4p8 (Harlan Stenn <stenn@ntp.org>, 2009/12/08) 647eb6d21b4SOllivier Robert 648eb6d21b4SOllivier RobertFocus: Security Fixes 649eb6d21b4SOllivier Robert 650eb6d21b4SOllivier RobertSeverity: HIGH 651eb6d21b4SOllivier Robert 652eb6d21b4SOllivier RobertThis release fixes the following high-severity vulnerability: 653eb6d21b4SOllivier Robert 654eb6d21b4SOllivier Robert* [Sec 1331] DoS with mode 7 packets - CVE-2009-3563. 655eb6d21b4SOllivier Robert 656eb6d21b4SOllivier Robert See http://support.ntp.org/security for more information. 657eb6d21b4SOllivier Robert 658eb6d21b4SOllivier Robert NTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control utility. 659eb6d21b4SOllivier Robert In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while routine NTP time 660eb6d21b4SOllivier Robert transfers use modes 1 through 5. Upon receipt of an incorrect mode 7 661eb6d21b4SOllivier Robert request or a mode 7 error response from an address which is not listed 662eb6d21b4SOllivier Robert in a "restrict ... noquery" or "restrict ... ignore" statement, ntpd will 663eb6d21b4SOllivier Robert reply with a mode 7 error response (and log a message). In this case: 664eb6d21b4SOllivier Robert 665eb6d21b4SOllivier Robert * If an attacker spoofs the source address of ntpd host A in a 666eb6d21b4SOllivier Robert mode 7 response packet sent to ntpd host B, both A and B will 667eb6d21b4SOllivier Robert continuously send each other error responses, for as long as 668eb6d21b4SOllivier Robert those packets get through. 669eb6d21b4SOllivier Robert 670eb6d21b4SOllivier Robert * If an attacker spoofs an address of ntpd host A in a mode 7 671eb6d21b4SOllivier Robert response packet sent to ntpd host A, A will respond to itself 672eb6d21b4SOllivier Robert endlessly, consuming CPU and logging excessively. 673eb6d21b4SOllivier Robert 674eb6d21b4SOllivier Robert Credit for finding this vulnerability goes to Robin Park and Dmitri 675eb6d21b4SOllivier Robert Vinokurov of Alcatel-Lucent. 676eb6d21b4SOllivier Robert 677eb6d21b4SOllivier RobertTHIS IS A STRONGLY RECOMMENDED UPGRADE. 678eb6d21b4SOllivier Robert 679eb6d21b4SOllivier Robert--- 6802b15cb3dSCy Schubertntpd now syncs to refclocks right away. 6812b15cb3dSCy Schubert 6822b15cb3dSCy SchubertBackward-Incompatible changes: 6832b15cb3dSCy Schubert 6842b15cb3dSCy Schubertntpd no longer accepts '-v name' or '-V name' to define internal variables. 6852b15cb3dSCy SchubertUse '--var name' or '--dvar name' instead. (Bug 817) 6862b15cb3dSCy Schubert 6872b15cb3dSCy Schubert--- 688eb6d21b4SOllivier RobertNTP 4.2.4p7 (Harlan Stenn <stenn@ntp.org>, 2009/05/04) 689eb6d21b4SOllivier Robert 690eb6d21b4SOllivier RobertFocus: Security and Bug Fixes 691eb6d21b4SOllivier Robert 692eb6d21b4SOllivier RobertSeverity: HIGH 693eb6d21b4SOllivier Robert 694eb6d21b4SOllivier RobertThis release fixes the following high-severity vulnerability: 695eb6d21b4SOllivier Robert 696eb6d21b4SOllivier Robert* [Sec 1151] Remote exploit if autokey is enabled. CVE-2009-1252 697eb6d21b4SOllivier Robert 698eb6d21b4SOllivier Robert See http://support.ntp.org/security for more information. 699eb6d21b4SOllivier Robert 700eb6d21b4SOllivier Robert If autokey is enabled (if ntp.conf contains a "crypto pw whatever" 701eb6d21b4SOllivier Robert line) then a carefully crafted packet sent to the machine will cause 702eb6d21b4SOllivier Robert a buffer overflow and possible execution of injected code, running 703eb6d21b4SOllivier Robert with the privileges of the ntpd process (often root). 704eb6d21b4SOllivier Robert 705eb6d21b4SOllivier Robert Credit for finding this vulnerability goes to Chris Ries of CMU. 706eb6d21b4SOllivier Robert 707eb6d21b4SOllivier RobertThis release fixes the following low-severity vulnerabilities: 708eb6d21b4SOllivier Robert 709eb6d21b4SOllivier Robert* [Sec 1144] limited (two byte) buffer overflow in ntpq. CVE-2009-0159 710eb6d21b4SOllivier Robert Credit for finding this vulnerability goes to Geoff Keating of Apple. 711eb6d21b4SOllivier Robert 712eb6d21b4SOllivier Robert* [Sec 1149] use SO_EXCLUSIVEADDRUSE on Windows 713eb6d21b4SOllivier Robert Credit for finding this issue goes to Dave Hart. 714eb6d21b4SOllivier Robert 715eb6d21b4SOllivier RobertThis release fixes a number of bugs and adds some improvements: 716eb6d21b4SOllivier Robert 717eb6d21b4SOllivier Robert* Improved logging 718eb6d21b4SOllivier Robert* Fix many compiler warnings 719eb6d21b4SOllivier Robert* Many fixes and improvements for Windows 720eb6d21b4SOllivier Robert* Adds support for AIX 6.1 721eb6d21b4SOllivier Robert* Resolves some issues under MacOS X and Solaris 722eb6d21b4SOllivier Robert 723eb6d21b4SOllivier RobertTHIS IS A STRONGLY RECOMMENDED UPGRADE. 724eb6d21b4SOllivier Robert 725eb6d21b4SOllivier Robert--- 726eb6d21b4SOllivier RobertNTP 4.2.4p6 (Harlan Stenn <stenn@ntp.org>, 2009/01/07) 727eb6d21b4SOllivier Robert 728eb6d21b4SOllivier RobertFocus: Security Fix 729eb6d21b4SOllivier Robert 730eb6d21b4SOllivier RobertSeverity: Low 731eb6d21b4SOllivier Robert 732eb6d21b4SOllivier RobertThis release fixes oCERT.org's CVE-2009-0021, a vulnerability affecting 733eb6d21b4SOllivier Robertthe OpenSSL library relating to the incorrect checking of the return 734eb6d21b4SOllivier Robertvalue of EVP_VerifyFinal function. 735eb6d21b4SOllivier Robert 736eb6d21b4SOllivier RobertCredit for finding this issue goes to the Google Security Team for 737eb6d21b4SOllivier Robertfinding the original issue with OpenSSL, and to ocert.org for finding 738eb6d21b4SOllivier Robertthe problem in NTP and telling us about it. 739eb6d21b4SOllivier Robert 740eb6d21b4SOllivier RobertThis is a recommended upgrade. 741eb6d21b4SOllivier Robert--- 742ea906c41SOllivier RobertNTP 4.2.4p5 (Harlan Stenn <stenn@ntp.org>, 2008/08/17) 743ea906c41SOllivier Robert 744ea906c41SOllivier RobertFocus: Minor Bugfixes 745ea906c41SOllivier Robert 746ea906c41SOllivier RobertThis release fixes a number of Windows-specific ntpd bugs and 747ea906c41SOllivier Robertplatform-independent ntpdate bugs. A logging bugfix has been applied 748ea906c41SOllivier Robertto the ONCORE driver. 749ea906c41SOllivier Robert 750ea906c41SOllivier RobertThe "dynamic" keyword and is now obsolete and deferred binding to local 751ea906c41SOllivier Robertinterfaces is the new default. The minimum time restriction for the 752ea906c41SOllivier Robertinterface update interval has been dropped. 753ea906c41SOllivier Robert 754ea906c41SOllivier RobertA number of minor build system and documentation fixes are included. 755ea906c41SOllivier Robert 756ea906c41SOllivier RobertThis is a recommended upgrade for Windows. 757ea906c41SOllivier Robert 758ea906c41SOllivier Robert--- 759ea906c41SOllivier RobertNTP 4.2.4p4 (Harlan Stenn <stenn@ntp.org>, 2007/09/10) 760ea906c41SOllivier Robert 761ea906c41SOllivier RobertFocus: Minor Bugfixes 762ea906c41SOllivier Robert 763ea906c41SOllivier RobertThis release updates certain copyright information, fixes several display 764ea906c41SOllivier Robertbugs in ntpdc, avoids SIGIO interrupting malloc(), cleans up file descriptor 765ea906c41SOllivier Robertshutdown in the parse refclock driver, removes some lint from the code, 766ea906c41SOllivier Robertstops accessing certain buffers immediately after they were freed, fixes 767ea906c41SOllivier Roberta problem with non-command-line specification of -6, and allows the loopback 768ea906c41SOllivier Robertinterface to share addresses with other interfaces. 769ea906c41SOllivier Robert 770ea906c41SOllivier Robert--- 771ea906c41SOllivier RobertNTP 4.2.4p3 (Harlan Stenn <stenn@ntp.org>, 2007/06/29) 772ea906c41SOllivier Robert 773ea906c41SOllivier RobertFocus: Minor Bugfixes 774ea906c41SOllivier Robert 775ea906c41SOllivier RobertThis release fixes a bug in Windows that made it difficult to 776ea906c41SOllivier Robertterminate ntpd under windows. 777ea906c41SOllivier RobertThis is a recommended upgrade for Windows. 778ea906c41SOllivier Robert 779ea906c41SOllivier Robert--- 780ea906c41SOllivier RobertNTP 4.2.4p2 (Harlan Stenn <stenn@ntp.org>, 2007/06/19) 781ea906c41SOllivier Robert 782ea906c41SOllivier RobertFocus: Minor Bugfixes 783ea906c41SOllivier Robert 784ea906c41SOllivier RobertThis release fixes a multicast mode authentication problem, 785ea906c41SOllivier Robertan error in NTP packet handling on Windows that could lead to 786ea906c41SOllivier Robertntpd crashing, and several other minor bugs. Handling of 787ea906c41SOllivier Robertmulticast interfaces and logging configuration were improved. 788ea906c41SOllivier RobertThe required versions of autogen and libopts were incremented. 789ea906c41SOllivier RobertThis is a recommended upgrade for Windows and multicast users. 790ea906c41SOllivier Robert 791ea906c41SOllivier Robert--- 792ea906c41SOllivier RobertNTP 4.2.4 (Harlan Stenn <stenn@ntp.org>, 2006/12/31) 793ea906c41SOllivier Robert 794ea906c41SOllivier RobertFocus: enhancements and bug fixes. 795ea906c41SOllivier Robert 796ea906c41SOllivier RobertDynamic interface rescanning was added to simplify the use of ntpd in 797ea906c41SOllivier Robertconjunction with DHCP. GNU AutoGen is used for its command-line options 798ea906c41SOllivier Robertprocessing. Separate PPS devices are supported for PARSE refclocks, MD5 799ea906c41SOllivier Robertsignatures are now provided for the release files. Drivers have been 800ea906c41SOllivier Robertadded for some new ref-clocks and have been removed for some older 801ea906c41SOllivier Robertref-clocks. This release also includes other improvements, documentation 802ea906c41SOllivier Robertand bug fixes. 803ea906c41SOllivier Robert 804ea906c41SOllivier RobertK&R C is no longer supported as of NTP-4.2.4. We are now aiming for ANSI 805ea906c41SOllivier RobertC support. 806ea906c41SOllivier Robert 807ea906c41SOllivier Robert--- 808ea906c41SOllivier RobertNTP 4.2.0 (Harlan Stenn <stenn@ntp.org>, 2003/10/15) 809ea906c41SOllivier Robert 810ea906c41SOllivier RobertFocus: enhancements and bug fixes. 811