CVE-2015-5300

NameCVE-2015-5300
DescriptionThe panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-335-1, DSA-3388-1
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ntp (PTS)jessie (security), jessie1:4.2.6.p5+dfsg-7+deb8u2fixed
stretch1:4.2.8p10+dfsg-3+deb9u2fixed
buster1:4.2.8p12+dfsg-1fixed
sid1:4.2.8p12+dfsg-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ntpsource(unstable)1:4.2.8p4+dfsg-2medium
ntpsourcejessie1:4.2.6.p5+dfsg-7+deb8u1mediumDSA-3388-1
ntpsourcesqueeze1:4.2.6.p2+dfsg-1+deb6u4mediumDLA-335-1
ntpsourcewheezy1:4.2.6.p5+dfsg-2+deb7u6mediumDSA-3388-1

Notes

https://www.cs.bu.edu/~goldbe/NTPattack.html
https://bugzilla.redhat.com/show_bug.cgi?id=1271076

Search for package or bug name: Reporting problems