Menu
Exploits for dangerous network time protocol vulnerabilities can compromise systems

Exploits for dangerous network time protocol vulnerabilities can compromise systems

Systems administrators are urged to install critical patches that address remote code execution flaws in NTP

Remote code execution vulnerabilities in the standard implementation of the network time protocol (NTP) can be exploited by attackers to compromise servers, embedded devices and even critical infrastructure systems that run UNIX-like operating systems.

The flaws, which can be exploited by sending specially crafted packets to machines running a vulnerable version of the NTP daemon (ntpd), pose a greater threat to systems where the service runs under a highly privileged user account such as root.

However, even if the ntpd user has limited privileges, attackers could leverage other privilege escalation flaws to gain root access after exploiting the NTP flaws.

The Network Time Foundation, the organization that oversees the NTP project, has released version 4.2.8 of the standard protocol implementation to address the vulnerabilities. Some Linux distributions, including Red Hat have issued updated packages based on it, but others such as Ubuntu have yet to do so. Manufacturers of network security appliances and other embedded devices are likely still evaluating whether the flaws affect their products.

According to a security notice from the Network Time Foundation, the ntp 4.2.8 update fixes four buffer overflow vulnerabilities, tracked together as CVE-2014-9295 in the Common Vulnerabilities and Exposures database, and three other weaknesses in the protocol's cryptographic implementation and error handling. All issues were discovered by Neel Mehta and Stephen Roettger of the Google Security Team.

The U.S. government's Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) warned in an advisory Friday that exploit code for these vulnerabilities is publicly available already, which increases the risk associated with them. The organization advised industrial control system operators to evaluate the impact of the flaws in their respective environments, which may differ based on particular configurations.

"Ntpd typically does not have to run as root," said Johannes Ullrich, the CTO of the SANS Internet Storm Center, in a blog post. "Most Unix/Linux versions will configure NTP using a lower privileged user."

"Try to block inbound connections to ntp servers who do not have to be publicly reachable," Ullrich said. "However, be aware that simple stateful firewalls may not track UDP connections correctly and will allow access to internal NTP servers from any external IP if the NTP server recently established an outbound connection."

Systems administrators are advised the install the NTP patches as soon as they becomes available for their systems.

Subscribe here for up-to-date channel news

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags patchesSANS Technology InstituteGooglesecuritypatch managementNetwork Time FoundationRed HatExploits / vulnerabilitiesIndustrial Control Systems Cyber Emergency Response Teamintrusion

Featured

Slideshows

Tight lines as Hooked on Lenovo catches up at Great Barrier Island

Tight lines as Hooked on Lenovo catches up at Great Barrier Island

​Ingram Micro’s Hooked on Lenovo incentive programme recently rewarded 28 of New Zealand's top performing resellers with a full-on fishing trip at Great Barrier Island for the third year​ in a row.

Tight lines as Hooked on Lenovo catches up at Great Barrier Island
Inside the AWS Summit in Sydney

Inside the AWS Summit in Sydney

As the dust settles on the 2017 AWS Summit in Sydney, ARN looks back an action packed two-day event, covering global keynote presentations, 80 breakout sessions on the latest technology solutions, and channel focused tracks involving local cloud stories and insights.

Inside the AWS Summit in Sydney
Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day

Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day

Ingram Micro hosted its third annual Cure Kids Charity Golf Tournament at the North Shore Golf Club in Auckland. In total, 131 resellers, vendors and Ingram Micro suppliers enjoyed a round of golf consisting of challenges on each of the 18 sponsored holes, with Team Philips taking out the top honours.

Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day
Show Comments