AIX 5.3 TL 8 : xntpd (IZ68659)

medium Nessus Plugin ID 63798

Synopsis

The remote AIX host is missing a security patch.

Description

'NTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control utility. In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while routine NTP time transfers use modes 1 through 5. Upon receipt of an incorrect mode 7 request or a mode 7 error response from an address that is not listed in a 'restrict ... noquery' or 'restrict ...
ignore' segment, ntpd will reply with a mode 7 error response and log a message.'

'If an attacker spoofs the source address of ntpd host A in a mode 7 response packet sent to ntpd host B, both A and B will continuously send each other error responses, for as long as those packets get through.'

'If an attacker spoofs an address of ntpd host A in a mode 7 response packet sent to ntpd host A, then host A will respond to itself endlessly, consuming CPU and logging excessively.'.

Solution

Install the appropriate interim fix.

See Also

https://aix.software.ibm.com/aix/efixes/security/xntpd_advisory.asc

Plugin Details

Severity: Medium

ID: 63798

File Name: aix_IZ68659.nasl

Version: 1.11

Type: local

Published: 1/24/2013

Updated: 4/21/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 4.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Information

CPE: cpe:/o:ibm:aix:5.3

Required KB Items: Host/local_checks_enabled, Host/AIX/version, Host/AIX/lslpp

Exploit Ease: No known exploits are available

Patch Publication Date: 3/2/2010

Vulnerability Publication Date: 3/2/2010

Reference Information

CVE: CVE-2009-3563

BID: 37255

CERT: 568372