CVE-2015-5300

NameCVE-2015-5300
DescriptionThe panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-335-1, DSA-3388-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ntp (PTS)jessie, jessie (lts)1:4.2.6.p5+dfsg-7+deb8u3fixed
stretch1:4.2.8p10+dfsg-3+deb9u2fixed
buster, buster (lts)1:4.2.8p12+dfsg-4+deb10u1fixed
bullseye1:4.2.8p15+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ntpsourcesqueeze1:4.2.6.p2+dfsg-1+deb6u4DLA-335-1
ntpsourcewheezy1:4.2.6.p5+dfsg-2+deb7u6DSA-3388-1
ntpsourcejessie1:4.2.6.p5+dfsg-7+deb8u1DSA-3388-1
ntpsource(unstable)1:4.2.8p4+dfsg-2

Notes

https://www.cs.bu.edu/~goldbe/NTPattack.html
https://bugzilla.redhat.com/show_bug.cgi?id=1271076

Search for package or bug name: Reporting problems