OracleVM 3.3 / 3.4 : ntp (OVMSA-2017-0038)

high Nessus Plugin ID 97058

Synopsis

The remote OracleVM host is missing one or more security updates.

Description

The remote OracleVM system is missing necessary patches to address critical security updates :

- add disable monitor to default ntp.conf [CVE-2013-5211]

- don't limit rate of packets from sources (CVE-2016-7426)

- don't change interface from received packets (CVE-2016-7429)

- fix calculation of root distance again (CVE-2016-7433)

- require authentication for trap commands (CVE-2016-9310)

- fix crash when reporting peer event to trappers (CVE-2016-9311)

Solution

Update the affected ntp / ntpdate packages.

See Also

http://www.nessus.org/u?798cb9e7

http://www.nessus.org/u?3c07bfe5

Plugin Details

Severity: High

ID: 97058

File Name: oraclevm_OVMSA-2017-0038.nasl

Version: 3.10

Type: local

Published: 2/8/2017

Updated: 1/4/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: High

Base Score: 7.1

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:oracle:vm:ntpdate, cpe:/o:oracle:vm_server:3.3, p-cpe:/a:oracle:vm:ntp, cpe:/o:oracle:vm_server:3.4

Required KB Items: Host/local_checks_enabled, Host/OracleVM/release, Host/OracleVM/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/7/2017

Vulnerability Publication Date: 1/2/2014

Reference Information

CVE: CVE-2013-5211, CVE-2016-7426, CVE-2016-7429, CVE-2016-7433, CVE-2016-9310, CVE-2016-9311

BID: 64692