SA147 : March 2017 NTP Security Vulnerabilities

ASG-S200

17 more products

1403

07 June 2021

13 April 2017

CLOSED

Medium

CVSS v2: 6.5

SUMMARY 

Symantec Network Protection products using affected versions of the NTP reference implementation from ntp.org are susceptible to multiple vulnerabilities. A remote attacker can exploit these vulnerabilities to cause denial of service through application crashes.  A local attacker can exploit these vulnerabilities to execute arbitrary code.

AFFECTED PRODUCTS 

The following products are vulnerable:

Content Analysis (CA)
CVE Affected Version(s) Remediation
CVE-2016-9042, CVE-2017-6460,
CVE-2017-6463, CVE-2017-6464
2.2 and later Not vulnerable, fixed in 2.2.1.1.
2.1 Upgrade to later release with fixes.
1.3 Upgrade to later release with fixes.

 

Director
CVE Affected Version(s) Remediation
All CVEs except CVE-2017-6452 and CVE-2016-6459 6.1 Upgrade to a version of MC with the fixes.

 

Mail Threat Defense (MTD)
CVE Affected Version(s) Remediation
CVE-2016-9042, CVE-2017-6460,
CVE-2017-6463, CVE-2017-6464
1.1 Upgrade to a version of CAS and SMG with the fixes.

 

Management Center (MC)
CVE Affected Version(s) Remediation
CVE-2016-9042, CVE-2017-6460,
CVE-2017-6463, CVE-2017-6464
1.11 and later Not vulnerable, fixed in 1.11.1.1.
1.10 Upgrade to later release with fixes.
1.9 Upgrade to later release with fixes.

 

Reporter
CVE Supported Version(s) Remediation
CVE-2016-9042 10.2 and later Not vulnerable, fixed in 10.2.1.1
10.1 Upgrade to later release with fixes.
CVE-2017-6462, CVE-2017-6463,
CVE-2017-6464
10.5 Not vulnerable, fixed in 10.5.1.1
10.3, 10.4 (not vulnerable to known vectors of attack) Upgrade to later release with fixes.
10.2 Not vulnerable, fixed in 10.2.1.1
10.1 (not vulnerable to known vectors of attack) Upgrade to later release with fixes.
All CVEs 9.4, 9.5 Not vulnerable

 

Security Analytics
CVE Affected Version(s) Remediation
CVE-2016-9042, CVE-2017-6460,
CVE-2017-6455, CVE-2017-6458
7.3 and later Not vulnerable, fixed in 7.3.1
CVE-2016-9042, CVE-2017-6460 7.2 Upgrade to 7.2.4.
CVE-2017-6455, CVE-2017-6458 7.2 Upgrade to 7.2.4.
7.1 Upgrade to later release with fixes.
CVE-2017-6462, CVE-2017-6463,
CVE-2017-6464
8.1 Not vulnerable, fixed in 8.1.1
7.3, 8.0 Upgrade to later release with fixes.
7.2 Upgrade to 7.2.4.
7.1 Upgrade to later release with fixes.

 

SSL Visibility (SSLV)
CVE Affected Version(s) Remediation
All CVEs 4.1 and later Not vulnerable, fixed in 4.1.1.1
CVE-2016-9042, CVE-2017-6460,
CVE-2017-6463, CVE-2017-6464
4.0 Upgrade to later release with fixes.

CVE-2017-6463, CVE-2017-6464

3.12 Upgrade to later release with fixes.
3.11 Upgrade to later release with fixes.
3.10 Upgrade to later release with fixes.
3.8.4FC, 3.9 Upgrade to later release with fixes.

 

The following products contain a vulnerable version of the ntp.org NTP reference implementation, but are not vulnerable to known vectors of attack:

Advanced Secure Gateway (ASG)
CVE Affected Version(s) Remediation
All CVEs except CVE-2017-6451, CVE-2017-6452, and CVE-2017-6459 7.1 and later Not vulnerable, fixed in 7.1.1.1
6.7 Upgrade to 6.7.3.1.
6.6 Upgrade to later release with fixes.

 

ADDITIONAL PRODUCT INFORMATION

Symantec Network Protection products do not enable or use all functionality within the ntp.org NTP reference implementation.  The products listed below do not utilize the functionality described in the CVEs below and are thus not known to be vulnerable to them.  However, fixes for these CVEs will be included in the patches that are provided.

  • ASG: all CVEs except CVE-2017-6451, CVE-2017-6452, and CVE-2017-6459
  • CA: CVE-2017-6455, CVE-2017-6458, and CVE-2017-6462
  • MTD: CVE-2017-6455, CVE-2017-6458, and CVE-2017-6462
  • MC: CVE-2017-6455, CVE-2017-6458, and CVE-2017-6462
  • Reporter 10.1, 10.3, 10.4: CVE-2017-6451 (10.1 only), CVE-2017-6458 (10.1 only), CVE-2017-6460 (10.1 only), CVE-2017-6462, CVE-2017-6463, CVE-2017-6464
  • SSLV: CVE-2017-6455, CVE-2017-6458, and CVE-2017-6462

The following products are not vulnerable:
Android Mobile Agent
AuthConnector
BCAAA
Symantec HSM Agent for the Luna SP
CacheFlow
Client Connector
Cloud Data Protection for Salesforce
Cloud Data Protection for Salesforce Analytics
Cloud Data Protection for ServiceNow
Cloud Data Protection for Oracle CRM On Demand
Cloud Data Protection for Oracle Field Service Cloud
Cloud Data Protection for Oracle Sales Cloud
Cloud Data Protection Integration Server
Cloud Data Protection Communication Server
Cloud Data Protection Policy Builder
General Auth Connector Login Application
IntelligenceCenter
IntelligenceCenter Data Collector
K9
Malware Analysis
Norman Shark Industrial Control System Protection
Norman Shark Network Protection
Norman Shark SCADA Protection
PacketShaper
PacketShaper S-Series
PolicyCenter
PolicyCenter S-Series
ProxyAV
ProxyAV ConLog and ConLogXP
ProxyClient
ProxySG

Unified Agent
Web Isolation


The following products are under investigation:
X-Series XOS

ISSUES 

CVE-2016-9042
Severity / CVSSv2 Medium / 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
References SecurityFocus: BID 97046 / Red Hat: CVE-2016-9042
Impact Denial of service
Description A flaw in ntpd origin timestamp validation allows a remote attacker who can spoof packets from a configured time server to cause ntpd to discard responses from that server.  A remote attacker who can spoof packets from all configured time servers can prevent ntpd from adjusting the system time, resulting in denial of service.

 

CVE-2017-6451
Severity / CVSSv2 Medium / 4.6 (AV:L/AC:L/Au:N/C:P/I:P/A:P)
References SecurityFocus: BID 97058 / NVD: CVE-2017-6451
Impact Code execution
Description An out-of-bounds write flaw in the legacy MX4200 refclock allows a local attacker to execute arbitrary code via unspecified vectors.

 

CVE-2017-6452
Severity / CVSSv2 Medium / 4.6 (AV:L/AC:L/Au:N/C:P/I:P/A:P)
References SecurityFocus: BID 97078 / NVD: CVE-2017-6452
Impact Unspecified
Description An out-of-bounds write flaw in the NTP library Windows installer allows a local attacker to pass in a crafted application path and have unspecified impact.

 

CVE-2017-6455
Severity / CVSSv2 Medium / 4.4 (AV:L/AC:M/Au:N/C:P/I:P/A:P)
References SecurityFocus: BID 97074 / NVD: CVE-2017-6455
Impact Code execution
Description A flaw in ntpd under Windows NT allows a local attacker to specify a malicious DLL in the PPSAPI_DLLS environment variable and execute arbitrary code within ntpd.

 

CVE-2017-6458
Severity / CVSSv2 Medium / 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)
References SecurityFocus: BID 97051 / NVD: CVE-2017-6458
Impact Unspecified
Description A flaw in ntpd allows a remote attacker to send query requests and have unspecified impact.  Successful exploitation requires the query responses to include custom variables with long names, which have been pre-configured in the ntpd configuration file.

 

CVE-2017-6459
Severity / CVSSv2 Low / 2.1 (AV:L/AC:L/Au:N/C:N/I:N/A:P)
References SecurityFocus: BID 97076 / NVD: CVE-2017-6459
Impact Unspecified
Description A flaw in the NTP library Windows installer allows local attackers to have unspecified impact via vectors related to an argument with multiple NULL bytes.

 

CVE-2017-6460
Severity / CVSSv2 Medium / 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)
References SecurityFocus: BID 97052 / NVD: CVE-2017-6460
Impact Denial of service, code execution
Description A flaw in ntpq allows a malicious remote NTP server to send a crafted list response and cause a stack-based buffer overflow. The malicious server can execute arbitrary code on the host running ntpq or cause ntpq to crash.

 

CVE-2017-6462
Severity / CVSSv2 Medium / 4.6 (AV:L/AC:L/Au:N/C:P/I:P/A:P)
References SecurityFocus: BID 97045 / NVD: CVE-2017-6462
Impact Unspecified
Description A flaw in the legacy Datum Programmable Time Server (DPTS) refclock driver allows local attackers to cause a buffer overflow in ntpd via a crafted /dev/datum device file, and have unspecified impact.

 

CVE-2017-6463
Severity / CVSSv2 Medium / 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)
References SecurityFocus: BID 97049 / NVD: CVE-2017-6463
Impact Denial of service
Description A flaw in ntpd allows a remote authenticated attacker to send a crafted unpeer configuration request and cause ntpd to crash, resulting in denial of service.

 

CVE-2017-6464
Severity / CVSSv2 Medium / 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P)
References SecurityFocus: BID 97050 / NVD: CVE-2017-6464
Impact Denial of service
Description A flaw in ntpd allows a remote authenticated attacker to send a crafted mode configuration request and cause ntpd to crash, resulting in denial of service.

 

MITIGATION 

These vulnerabilities can be exploited only through the management network port for Director, MTD, MC, and SSLV.  Allowing only machines, IP addresses and subnets from a trusted network to access to the management network port reduces the threat of exploiting the vulnerabilities.

By default, Director does not use the PPSAPI_DLLS environment variable, custom variables with long names, and the DPTS refclock.  Customers who leave these NTP features disabled prevent attacks against Director using CVE-2017-6455, CVE-2017-6458, and CVE-2017-6462.

By default, Security Analytics does not use the PPSAPI_DLLS environment variable, custom variables with long names, ntpq, and the DPTS refclock.  Customers who leave these NTP features disabled prevent attacks against Director using CVE-2017-6455, CVE-2017-6458, CVE-2017-6460, and CVE-2017-6462.

REFERENCES 

NTP Security Notice - https://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu

REVISION 

2021-05-21 A fix for Security Analytics 7.2 is available in 7.2.4. Moving Advisory Status to Closed.
2021-01-12 A fix for SSLV 3.10 and SSLV 3.12 will not be provided.  Please upgrade to a later version with the vulnerability fixes.
2020-11-17 A fix for MTD 1.1 will not be provided.  Please upgrade to a version of CAS and SMG with the vulnerability fixes.  A fix for SA 7.3 and 8.0 will not be provided.  Please upgrade to a later version with the vulnerability fixes.  A fix for Director 6.1 will not be provided. Please upgrade to a version of MC with the vulnerability fixes.  A fix for Reporter 10.4 will not be provided.  Please upgrade to a later version with the vulnerability fixes. 
2020-04-28 Reporter 10.3 and 10.4 are not vulnerable to CVE-2016-9042.
2020-04-23 Advanced Secure Gateway (ASG) 7.1 and later versions are not vulnerable because a fix is available in 7.1.1.1. Fixes for Reporter 10.3 and 10.4 will not be provided. Please provide to a later version with the vulnerability fixes. Reporter 10.5 is not vulnerable because a fix is available in 10.5.1.1. Security Analytics 8.1 is not vulnerable because a fix is available in 8.1.1. 
2019-10-02 Web Isolation is not vulnerable.
2019-08-29 Reporter 10.1 is vulnerable to CVE-2016-9042. Reporter 10.2 is not vulnerable because a fix for all CVEs is available in 10.2.1.1. Reporter 10.3 and 10.4 have vulnerable versions of the NTP reference implementation, but are not vulnerable to known vectors of attack.
2019-08-08 SSLV 3.x is not vulnerable to CVE-2017-6460.
2019-08-07 A fix for ASG 6.6 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2019-01-21 SA 7.3 starting with 7.3.2 and 8.0 are vulnerable to CVE-2017-6462, CVE-2017-6463, and CVE-2017-6464.
2019-01-11 A fix for CA 2.1 will not be provided.  Please upgrade to a later version with the vulnerability fixes.  Added remaining CVSS v2 scores from NVD.
2018-08-07 A fix for CA 1.3 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2018-06-25 A fix for SSLV 3.11 will not be provided.  Please upgrade to a later version with the vulnerability fixes.
2018-04-26 A fix for SSLV 4.0 will not be provided.  Please upgrade to a later version with the vulnerability fixes.
2018-04-22 CA 2.3 is not vulnerable.
2018-01-31 A fix for ASG 6.7 is avaialble in 6.7.3.1.
2017-11-09 MC 1.11 is not vulnerable because a fix is available in 1.11.1.1.  A fix for MC 1.10 will not be provided.  Please upgrade to a later version with the vulnerability fixes.
2017-11-08 CAS 2.2 is not vulnerable because a fix is available in 2.2.1.1.
2017-11-06 ASG 6.7 has a vulnerable version of the NTP reference implementation, but is not vulnerable to known vectors of attack.
2017-08-03 SSLV 4.1 is not vulnerable because a fix is available in 4.1.1.1.
2017-07-23 MC 1.10 is vulnerable to CVE-2016-9042, CVE-2017-6460, CVE-2017-6463, and CVE-2017-6464.  It also has a vulnerable version of the NTP reference implementation for CVE-2017-6455, CVE-2017-6458, and CVE-2017-6462.  A fix for MC 1.9 will not be provided.  Please upgrade to a later version with the vulnerability fixes.
2017-06-22 Security Analytics 7.3 is not vulnerable because a fix is available in 7.3.1.
2017-05-19 CA 2.1 is vulnerable to CVE-2016-9042, CVE-2017-6460, CVE-2017-6463, and CVE-2017-6464.
2017-05-05 Security Analytics 7.1 and 7.2 are vulnerable to CVE-2017-6458, CVE-2017-6462, CVE-2017-6463, and CVE-2017-6464.  Security Analytics 7.2 is also vulnerable to CVE-2016-9042 and CVE-2017-6460.
2017-04-13 initial public release