Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 21 Jan 2016 09:30:59 +0000 (UTC)
From:      Xin LI <delphij@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r406838 - head/security/vuxml
Message-ID:  <201601210930.u0L9UxaF051668@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: delphij
Date: Thu Jan 21 09:30:59 2016
New Revision: 406838
URL: https://svnweb.freebsd.org/changeset/ports/406838

Log:
  Document NTP multiple vulnerabilities.

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Thu Jan 21 09:29:01 2016	(r406837)
+++ head/security/vuxml/vuln.xml	Thu Jan 21 09:30:59 2016	(r406838)
@@ -58,6 +58,80 @@ Notes:
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="5237f5d7-c020-11e5-b397-d050996490d0">
+    <topic>ntp -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>ntp</name>
+	<range><lt>4.2.8p6</lt></range>
+      </package>
+      <package>
+	<name>ntp-devel</name>
+	<range><lt>4.3.90</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Network Time Foundation reports:</p>
+	<blockquote cite="http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit">;
+	  <p>NTF's NTP Project has been notified of the following low-
+	    and medium-severity vulnerabilities that are fixed in
+	    ntp-4.2.8p6, released on Tuesday, 19 January 2016:</p>
+	  <ul>
+	    <li>Bug 2948 / CVE-2015-8158: Potential Infinite Loop
+	      in ntpq.  Reported by Cisco ASIG.</li>
+	    <li>Bug 2945 / CVE-2015-8138: origin: Zero Origin
+	      Timestamp Bypass.  Reported by Cisco ASIG.</li>
+	    <li>Bug 2942 / CVE-2015-7979: Off-path Denial of
+	      Service (DoS) attack on authenticated broadcast
+	      mode.  Reported by Cisco ASIG.</li>
+	    <li>Bug 2940 / CVE-2015-7978: Stack exhaustion in
+	      recursive traversal of restriction list.
+	      Reported by Cisco ASIG.</li>
+	    <li>Bug 2939 / CVE-2015-7977: reslist NULL pointer
+	      dereference.  Reported by Cisco ASIG.</li>
+	    <li>Bug 2938 / CVE-2015-7976: ntpq saveconfig command
+	      allows dangerous characters in filenames.
+	      Reported by Cisco ASIG.</li>
+	    <li>Bug 2937 / CVE-2015-7975: nextvar() missing length
+	      check.  Reported by Cisco ASIG.</li>
+	    <li>Bug 2936 / CVE-2015-7974: Skeleton Key: Missing
+	      key check allows impersonation between authenticated
+	      peers.  Reported by Cisco ASIG.</li>
+	    <li>Bug 2935 / CVE-2015-7973: Deja Vu: Replay attack on
+	      authenticated broadcast mode.  Reported by Cisco ASIG.</li>
+	  </ul>
+	  <p>Additionally, mitigations are published for the following
+	    two issues:</p>
+	  <ul>
+	    <li>Bug 2947 / CVE-2015-8140: ntpq vulnerable to replay
+	      attacks.  Reported by Cisco ASIG.</li>
+	    <li>Bug 2946 / CVE-2015-8139: Origin Leak: ntpq and ntpdc,
+	      disclose origin.  Reported by Cisco ASIG.</li>
+	  </ul>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2015-7973</cvename>
+      <cvename>CVE-2015-7974</cvename>
+      <cvename>CVE-2015-7975</cvename>
+      <cvename>CVE-2015-7976</cvename>
+      <cvename>CVE-2015-7977</cvename>
+      <cvename>CVE-2015-7978</cvename>
+      <cvename>CVE-2015-7979</cvename>
+      <cvename>CVE-2015-8138</cvename>
+      <cvename>CVE-2015-8139</cvename>
+      <cvename>CVE-2015-8140</cvename>
+      <cvename>CVE-2015-8158</cvename>
+      <url>http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit</url>;
+    </references>
+    <dates>
+      <discovery>2016-01-20</discovery>
+      <entry>2016-01-21</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="62c0dbbd-bfce-11e5-b5fe-002590263bf5">
     <topic>cgit -- multiple vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201601210930.u0L9UxaF051668>