CVE-2015-3405
Low
Low
Medium
High
Critical
CVSS Score
Vulnerability Description
ntp-keygen in ntp 4.2.8px before 4.2.8p2-RC2 and 4.3.x before 4.3.12 does not generate MD5 keys with sufficient entropy on big endian machines when the lowest order byte of the temp variable is between 0x20 and 0x7f and not #, which might allow remote attackers to obtain the value of generated MD5 keys via a brute force attack with the 93 possible keys.
Known Affected Software
26 configuration(s) from 7 vendor(s)
debian_linux
Version:
8.0
CPE:
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
debian_linux
Version:
7.0
CPE:
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
fedora
Version:
21
CPE:
cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
ntp
Version:
4.3.6
CPE:
cpe:2.3:a:ntp:ntp:4.3.6:*:*:*:*:*:*:*
ntp
Version:
4.2.8
CPE:
cpe:2.3:a:ntp:ntp:4.2.8:p15:*:*:*:*:*:*
ntp
Version:
4.3.7
CPE:
cpe:2.3:a:ntp:ntp:4.3.7:*:*:*:*:*:*:*
ntp
Version:
4.3.4
CPE:
cpe:2.3:a:ntp:ntp:4.3.4:*:*:*:*:*:*:*
ntp
Version:
4.3.8
CPE:
cpe:2.3:a:ntp:ntp:4.3.8:*:*:*:*:*:*:*
ntp
Version:
4.3.3
CPE:
cpe:2.3:a:ntp:ntp:4.3.3:*:*:*:*:*:*:*
ntp
Version:
4.3.0
CPE:
cpe:2.3:a:ntp:ntp:4.3.0:*:*:*:*:*:*:*
ntp
Version:
4.3.2
CPE:
cpe:2.3:a:ntp:ntp:4.3.2:*:*:*:*:*:*:*
ntp
Version:
4.3.10
CPE:
cpe:2.3:a:ntp:ntp:4.3.10:*:*:*:*:*:*:*
ntp
Version:
4.3.1
CPE:
cpe:2.3:a:ntp:ntp:4.3.1:*:*:*:*:*:*:*
ntp
Version:
4.3.9
CPE:
cpe:2.3:a:ntp:ntp:4.3.9:*:*:*:*:*:*:*
ntp
Version:
4.3.5
CPE:
cpe:2.3:a:ntp:ntp:4.3.5:*:*:*:*:*:*:*
ntp
Version:
4.3.11
CPE:
cpe:2.3:a:ntp:ntp:4.3.11:*:*:*:*:*:*:*
suse_linux_enterprise_server
Version:
11.0
CPE:
cpe:2.3:o:opensuse:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*
suse_linux_enterprise_desktop
Version:
11.0
CPE:
cpe:2.3:o:opensuse_project:suse_linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*
enterprise_linux_for_scientific_computing
Version:
6.0
CPE:
cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:x64:*
enterprise_linux_server_from_rhui_6
Version:
6.0
CPE:
cpe:2.3:o:redhat:enterprise_linux_server_from_rhui_6:6.0:*:*:*:*:*:*:*
enterprise_linux_server
Version:
6.0
CPE:
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:x86:*
enterprise_linux_for_ibm_z_systems
Version:
6.0
CPE:
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0:*:*:*:*:*:*:*
enterprise_linux_desktop
Version:
6.0
CPE:
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:x64:*
enterprise_linux_for_power_big_endian
Version:
6.0
CPE:
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0:*:*:*:*:*:*:*
enterprise_linux_workstation
Version:
6.0
CPE:
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:x86:*
suse_linux_enterprise_server
Version:
11.0
CPE:
cpe:2.3:o:suse:suse_linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*
This vulnerability affects 26 software configuration(s). Ensure you patch all affected systems.
References & Resources
-
http://bk1.ntp.org/ntp-stable/?PAGE=patch&REV=55199296N2gFqH1Hm5GOnhrk9Ypyggsecalert@redhat.com Third Party Advisory Vendor Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156248.htmlsecalert@redhat.com Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00000.htmlsecalert@redhat.com Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-1459.htmlsecalert@redhat.com Third Party Advisory VDB Entry
-
http://rhn.redhat.com/errata/RHSA-2015-2231.htmlsecalert@redhat.com Third Party Advisory VDB Entry
-
http://www.debian.org/security/2015/dsa-3223secalert@redhat.com Third Party Advisory
-
http://www.debian.org/security/2015/dsa-3388secalert@redhat.com Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2015/04/23/14secalert@redhat.com Mailing List Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.htmlsecalert@redhat.com
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.htmlsecalert@redhat.com
-
http://www.securityfocus.com/bid/74045secalert@redhat.com Third Party Advisory VDB Entry
-
https://bugs.ntp.org/show_bug.cgi?id=2797secalert@redhat.com Issue Tracking Third Party Advisory Vendor Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1210324secalert@redhat.com Issue Tracking Patch Third Party Advisory VDB Entry
-
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03886en_ussecalert@redhat.com
-
http://bk1.ntp.org/ntp-stable/?PAGE=patch&REV=55199296N2gFqH1Hm5GOnhrk9Ypyggaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory Vendor Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156248.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00000.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-1459.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory VDB Entry
-
http://rhn.redhat.com/errata/RHSA-2015-2231.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory VDB Entry
-
http://www.debian.org/security/2015/dsa-3223af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.debian.org/security/2015/dsa-3388af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2015/04/23/14af854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://www.securityfocus.com/bid/74045af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory VDB Entry
-
https://bugs.ntp.org/show_bug.cgi?id=2797af854a3a-2127-422b-91ae-364da2661108 Issue Tracking Third Party Advisory Vendor Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1210324af854a3a-2127-422b-91ae-364da2661108 Issue Tracking Patch Third Party Advisory VDB Entry
-
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03886en_usaf854a3a-2127-422b-91ae-364da2661108
Severity Details
out of 10.0
Low
Weakness Type (CWE)
CWE-331
Insufficient Entropy
- Description
- The product uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.
- Typical Severity
- Medium
- Abstraction Level
- Base
Key Information
- Published Date
- August 09, 2017
