Security-Announce archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

NetBSD Security Advisory 2010-005: NTP server Denial of Service vulnerability



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


                 NetBSD Security Advisory 2010-005
                 =================================

Topic:          NTP server Denial of Service vulnerability


Version:        NetBSD-current:         affected prior to 2009-12-08
                NetBSD 5.0.2:           not affected
                NetBSD 5.0.1:           affected
                NetBSD 5.0:             affected
                NetBSD 4.0.*:           affected
                NetBSD 4.0:             affected
                pkgsrc:                 ntp package prior to 4.2.4p8


Severity:       Remote Denial of Service


Fixed:          NetBSD-current:         Dec 8, 2009
                NetBSD-5-0 branch:      Dec 8, 2009
                NetBSD-5 branch:        Dec 8, 2009
                NetBSD-4-0 branch:      Dec 8, 2009
                NetBSD-4 branch:        Dec 8, 2009
                pkgsrc 2009Q4:          ntp-4.2.4p8 corrects this issue

Please note that NetBSD releases prior to 4.0 are no longer supported.
It is recommended that all users upgrade to a supported release.



Abstract
========

A programming error in the handling of NTP MODE_PRIVATE packets
allows a remote attacker to cause a denial of service.

This vulnerability has been assigned CVE-2009-3563 and CERT
Vulnerability Note VU#568372.


Technical Details
=================

ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows
remote attackers to cause a denial of service (CPU and bandwidth
consumption) by using MODE_PRIVATE to send a spoofed (1) request or
(2) response packet that triggers a continuous exchange of
MODE_PRIVATE error responses between two NTP daemons.


Solutions and Workarounds
=========================

As a workaround, disable the NTP service in your system by running the
following commands:

        # /etc/rc.d/ntpd stop
        # echo ntpd=NO > /etc/rc.conf.d/ntpd

The following instructions describe how to upgrade your ntpd
binaries by updating your source tree and rebuilding and
installing a new version of ntpd:

* NetBSD-current:

        Systems running NetBSD-current dated from before 2009-12-08
        should be upgraded to NetBSD-current dated 2009-12-09 or later.

        The following files/directories need to be updated from the
        netbsd-current CVS branch (aka HEAD):
                dist/ntp/ntpd/ntp_request.c

        To update from CVS, re-build, and re-install ntpd:
                # cd src
                # cvs update -d -P dist/ntp/ntpd/ntp_request.c
                # cd usr.sbin/ntp/ntpd
                # make USETOOLS=no cleandir dependall
                # make USETOOLS=no install

* NetBSD 5.*:

        Systems running NetBSD 5.* sources dated from before
        2009-12-08 should be upgraded from NetBSD 5.* sources dated
        2009-12-09 or later.

        The following files/directories need to be updated from the
        netbsd-5 or netbsd-5-0 branches:
                dist/ntp/ntpd/ntp_request.c

        To update from CVS, re-build, and re-install ntpd:

                # cd src
                # cvs update -r <branch_name> -d -P dist/ntp/ntpd/ntp_request.c
                # cd usr.sbin/ntp/ntpd
                # make USETOOLS=no cleandir dependall
                # make USETOOLS=no install

* NetBSD 4.*:

        Systems running NetBSD 4.* sources dated from before
        2009-12-08 should be upgraded from NetBSD 4.* sources dated
        2009-12-09 or later.

        The following files/directories need to be updated from the
        netbsd-4 or netbsd-4-0 branches:
                dist/ntp/ntpd/ntp_request.c

        To update from CVS, re-build, and re-install ntpd:

                # cd src
                # cvs update -r <branch_name> -d -P dist/ntp/ntpd/ntp_request.c
                # cd usr.sbin/ntp/ntpd
                # make USETOOLS=no cleandir dependall
                # make USETOOLS=no install


Thanks To
=========

Dmitri Vinokurov and Robin Park for discovering and reporting the vulnerability,
and Frank Kardel for fixing it in NetBSD.


Revision History
================

        2010-04-27      Initial release


More Information
================

Advisories may be updated as new information becomes available.
The most recent version of this advisory (PGP signed) can be found at 
  http://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2010-005.txt.asc

Information about NetBSD and NetBSD security can be found at
http://www.NetBSD.org/ and http://www.NetBSD.org/Security/ .

Copyright 2010, The NetBSD Foundation, Inc.  All Rights Reserved.
Redistribution permitted only in full, unmodified form.

$NetBSD: NetBSD-SA2010-005.txt,v 1.1 2010/04/25 23:25:30 tonnerre Exp $

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (NetBSD)
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=k9Vv
-----END PGP SIGNATURE-----


Home | Main Index | Thread Index | Old Index