NTP Vulnerability - Cisco Systems

critical Nessus Plugin ID 48965

Language:

Synopsis

The remote device is missing a vendor-supplied security patch

Description

Network Time Protocol (NTP) is used to synchronize time on multiple devices. A vulnerability has been discovered in the NTP daemon query processing functionality. This vulnerability has been publicly announced.

Other Cisco software applications may run on Solaris platforms and where those products have not specifically been identified, customers should install security patches regularly in accordance with their normal maintenance procedures. Cisco is continuing to research this issue in other products that may be affected. Unless explicitly stated otherwise, all other products are considered to be unaffected. There are workarounds available to mitigate the effects.

Solution

Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20020508-ntp-vulnerability.

See Also

http://www.nessus.org/u?b4069e30

http://www.nessus.org/u?033c44be

http://www.nessus.org/u?631deffd

Plugin Details

Severity: Critical

ID: 48965

File Name: cisco-sa-20020508-ntp-vulnerabilityhttp.nasl

Version: 1.12

Type: local

Family: CISCO

Published: 9/1/2010

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: Host/Cisco/IOS/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/8/2002

Vulnerability Publication Date: 4/4/2001

Exploitable With

Metasploit (NTP Daemon readvar Buffer Overflow)

Reference Information

CVE: CVE-2001-0414

BID: 2540