CVE-2015-3405
Publication date 9 August 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
ntp-keygen in ntp 4.2.8px before 4.2.8p2-RC2 and 4.3.x before 4.3.12 does not generate MD5 keys with sufficient entropy on big endian machines when the lowest order byte of the temp variable is between 0x20 and 0x7f and not #, which might allow remote attackers to obtain the value of generated MD5 keys via a brute force attack with the 93 possible keys.
Status
Package | Ubuntu Release | Status |
---|---|---|
ntp | ||
14.04 LTS trusty |
Fixed 1:4.2.6.p5+dfsg-3ubuntu2.14.04.3
|
|
Notes
mdeslaur
fixed in USN-2567-1 before the CVE was assigned we will not be fixing this in lucid before it goes EoL
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |