Slackware 10.0 / 10.1 / 10.2 / 11.0 / 12.0 / 12.1 / 12.2 / 13.0 / 8.1 / 9.0 / 9.1 / current : ntp (SSA:2009-343-01)

medium Nessus Plugin ID 43102

Synopsis

The remote Slackware host is missing a security update.

Description

New ntp packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 12.0, 12.1, 12.2, 13.0, and -current to fix a security issue. If a spoofed mode 7 packet is sent to a vulnerable NTP daemon it may cause CPU and/or disk space exhaustion, resulting in a denial of service.

Solution

Update the affected ntp package.

See Also

http://www.nessus.org/u?e2365a43

Plugin Details

Severity: Medium

ID: 43102

File Name: Slackware_SSA_2009-343-01.nasl

Version: 1.16

Type: local

Published: 12/11/2009

Updated: 1/14/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 4.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Information

CPE: cpe:/o:slackware:slackware_linux:12.2, cpe:/o:slackware:slackware_linux:10.1, cpe:/o:slackware:slackware_linux:8.1, cpe:/o:slackware:slackware_linux:9.0, cpe:/o:slackware:slackware_linux:11.0, cpe:/o:slackware:slackware_linux:9.1, cpe:/o:slackware:slackware_linux:13.0, cpe:/o:slackware:slackware_linux:10.2, cpe:/o:slackware:slackware_linux, cpe:/o:slackware:slackware_linux:12.0, p-cpe:/a:slackware:slackware_linux:ntp, cpe:/o:slackware:slackware_linux:10.0, cpe:/o:slackware:slackware_linux:12.1

Required KB Items: Host/local_checks_enabled, Host/Slackware/release, Host/Slackware/packages

Exploit Ease: No known exploits are available

Patch Publication Date: 12/10/2009

Reference Information

CVE: CVE-2009-3563

BID: 37255

SSA: 2009-343-01