Home CVE Database CVE-2015-8140

CVE-2015-8140

Description

The ntpq protocol is vulnerable to replay attacks. The sequence number being included under the signature fails to prevent replay attacks for two reasons. Commands that don\'t require authentication can be used to move the sequence number forward, and NTP doesn\'t actually care what sequence number is used so a packet can be replayed at any time. If, for example, an attacker can intercept authenticated reconfiguration commands that would. for example, tell ntpd to connect with a server that turns out to be malicious and a subsequent reconfiguration directive removed that malicious server, the attacker could replay the configuration command to re-establish an association to malicious server.

Priority: MEDIUM
CVSS v3: 4.8
Publish Date: Jan 27, 2016
Related ID: --
CVSS v2: Medium
Modified Date: Jan 27, 2016

Find out more about CVE-2015-8140 from the MITRE-CVE dictionary and NIST NVD


Products Affected

Login may be required to access defects or downloads.

Related Products

Product Name Status Defect Fixed Downloads
Linux 7 SCP Not Vulnerable -- -- --
Linux 7 CGP Not Vulnerable -- -- --

Comments

ntp

Live chat
Online