CVE-2015-5300

NameCVE-2015-5300
DescriptionThe panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-335-1, DSA-3388-1
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ntp (PTS)wheezy1:4.2.6.p5+dfsg-2+deb7u6fixed
wheezy (security)1:4.2.6.p5+dfsg-2+deb7u7fixed
jessie (security), jessie1:4.2.6.p5+dfsg-7+deb8u2fixed
stretch1:4.2.8p10+dfsg-3+deb9u1fixed
buster, sid1:4.2.8p10+dfsg-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ntpsource(unstable)1:4.2.8p4+dfsg-2medium
ntpsourcejessie1:4.2.6.p5+dfsg-7+deb8u1mediumDSA-3388-1
ntpsourcesqueeze1:4.2.6.p2+dfsg-1+deb6u4mediumDLA-335-1
ntpsourcewheezy1:4.2.6.p5+dfsg-2+deb7u6mediumDSA-3388-1

Notes

https://www.cs.bu.edu/~goldbe/NTPattack.html
https://bugzilla.redhat.com/show_bug.cgi?id=1271076

Search for package or bug name: Reporting problems