Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 4 Mar 2020 15:23:15 +0000 (UTC)
From:      Cy Schubert <cy@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r527761 - head/security/vuxml
Message-ID:  <202003041523.024FNFUA012887@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: cy
Date: Wed Mar  4 15:23:15 2020
New Revision: 527761
URL: https://svnweb.freebsd.org/changeset/ports/527761

Log:
  Document the latest nwtime.org ntp security advisory found at:
  http://support.ntp.org/bin/view/Main/SecurityNotice#\
  March_2020_ntp_4_2_8p14_NTP_Rele
  
  No CVEs have been documented yet.
  
  Security:	http://support.ntp.org/bin/view/Main/NtpBug3610
  		http://support.ntp.org/bin/view/Main/NtpBug3596
  		http://support.ntp.org/bin/view/Main/NtpBug3592

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Wed Mar  4 15:22:43 2020	(r527760)
+++ head/security/vuxml/vuln.xml	Wed Mar  4 15:23:15 2020	(r527761)
@@ -58,6 +58,62 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="591a706b-5cdc-11ea-9a0a-206a8a720317">
+    <topic>ntp -- Multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>FreeBSD</name>
+	<range><ge>11.3</ge><lt>11.3_7</lt></range>
+	<range><ge>12.0</ge><lt>12.0_14</lt></range>
+	<range><ge>12.1</ge><lt>12.1_3</lt></range>
+      </package>
+      <package>
+	<name>ntp</name>
+	<range><lt>4.2.8p14</lt></range>
+      </package>
+      <package>
+	<name>ntp-devel</name>
+	<range><le>4.3.99_6</le></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>nwtine.org reports:</p>
+	<blockquote cite="https://support.ntp.org/bin/view/Main/SecurityNotice">;
+	  <p>Three ntp vulnerabilities, Depending on configuration, may have
+	    little impact up to termination of the ntpd process.</p>
+	  <p>NTP Bug 3610:  Process_control() should exit earlier on short
+	    packets.  On systems that override the default and enable ntpdc
+	    (mode 7) fuzz testing detected that  a short packet will cause
+	    ntpd to read uninitialized data.</p>
+	  <p>NTP Bug 3596:  An unauthenticated unmonitored ntpd is vulnerable
+	    to attack on IPv4 with highly predictable transmit timestamps. An
+	    off-path attacker who can query time from the victim's ntp which
+	    receives time from an unauthenticated time source must be able to
+	    send from a spoofed IPv4 address of upstream ntp server and and
+	    the victim must be able to process a large number of packets with
+	    the spoofed IPv4 address of the upstream server.  After eight or
+	    more successful attacks in a row the attacker can either modify
+	    the victim's clock by a small amount or cause ntpd to terminate.
+	    The attack is especially effective when unusually short poll
+	    intervals have been configured.</p>
+	  <p>NTP Bug 3592:  The fix for https://bugs.ntp.org/3445 introduced
+	    a bug such that a ntp can be prevented from initiating a time
+	    volley to its peer resulting in a DoS.</p>
+	  <p>All three NTP bugs may result in DoS or terimation of the ntp
+	    daemon.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>INSERT BLOCKQUOTE URL HERE</url>
+    </references>
+    <dates>
+      <discovery>2019-05-30</discovery>
+      <entry>2020-03-03</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="b66583ae-5aee-4cd5-bb31-b2d397f8b6b3">
     <topic>librsvg2 -- multiple vulnabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202003041523.024FNFUA012887>