FreeBSD : ntpd DRDoS / Amplification Attack using ntpdc monlist command (3d95c9a7-7d5c-11e3-a8c1-206a8a720317)

medium Nessus Plugin ID 71960

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

ntp.org reports :

Unrestricted access to the monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013

Use noquery to your default restrictions to block all status queries.

Use disable monitor to disable the ``ntpdc -c monlist'' command while still allowing other status queries.

Solution

Update the affected package.

See Also

http://www.nessus.org/u?58c8d5f5

http://www.nessus.org/u?0fa4d7b9

Plugin Details

Severity: Medium

ID: 71960

File Name: freebsd_pkg_3d95c9a77d5c11e3a8c1206a8a720317.nasl

Version: 1.11

Type: local

Published: 1/15/2014

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:ntp, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/14/2014

Vulnerability Publication Date: 1/1/2014

Reference Information

CVE: CVE-2013-5211

BID: 64692

FreeBSD: SA-14:02.ntpd