Wednesday, October 21, 2015

Cisco Identifies Multiple Vulnerabilities in Network Time Protocol daemon (ntpd)

Cisco is committed to improving the overall security of the products and services our customers rely on. As part of this commitment, Cisco assesses the security of software components used in our products. Open source software plays a key role in many Cisco products and as a result, ensuring the security of open source software components is vital, especially in the wake of major vulnerabilities such as Heartbleed and Shellshock.

In April 2014, the Linux Foundation spearheaded the creation of the Core Infrastructure Initiative in response to the disclosure of Heartbleed with the goal of securing open source projects that are widely used on the internet. As a member of the Linux Foundation Core Infrastructure Initiative (CII) Steering Group, Cisco is contributing to the CII effort by evaluating the Network Time Protocol daemon (ntpd) for security defects. ntpd is a widely deployed software package used to synchronize time between hosts. ntpd ships with a wide variety of network and embedded devices as well as desktop and server operating systems, including Mac OS X, major Linux distributions, and BSDs.

Today, in coordination with the NTP Project, Cisco is releasing 8 advisories for vulnerabilities that have been identified by the Talos Group and the Advanced Security Initiatives Group (ASIG) within Cisco. These vulnerabilities have been reported to the NTP Project in accordance with Cisco vulnerability reporting and disclosure guidelines. The NTP Project has responded by issuing a Security Advisory along with releasing a patched version of ntpd. The following serves as a summary for all the advisories being released. For the full advisories, readers should visit the Vulnerability Reports page on the Talos website.

Advisory Summaries

The advisories that are being released today are broken down by vulnerability type.

Error Handling Logic Error

An error handling logic error exists within ntpd that manifests due to improper error condition handling associated with certain crypto-NAK packets. An unauthenticated, off­-path attacker can force ntpd processes on targeted servers to peer with time sources of the attacker's choosing by transmitting symmetric active crypto­-NAK packets to ntpd. This attack bypasses the authentication typically required to establish a peer association and allows an attacker to make arbitrary changes to system time. Matthew Van Gundy of Cisco ASIG is credited with discovering this vulnerability.
  • CVE-2015-7871 - NAK to the Future: NTP crypto-NAK Symmetric Association Authentication Bypass Vulnerability

Memory Corruption

Multiple memory corruption vulnerabilities exist within ntpd that can manifest themselves due to improper handling of objects in memory. An adversary who exploits these vulnerabilities could modify memory via a buffer overflow or use-after-free condition. Aleksandar Nikolic and Yves Younan of Cisco Talos are credited with the discovery of these vulnerabilities.
  • CVE-2015-7849 - Network Time Protocol Trusted Keys Memory Corruption Vulnerability
  • CVE-2015-7852 - Network Time Protocol ntpq atoascii Memory Corruption Vulnerability
  • CVE-2015-7853 - Network Time Protocol Reference Clock Memory Corruption Vulnerability
  • CVE-2015-7854 - Network Time Protocol Password Length Memory Corruption Vulnerability

Denial of Service

Multiple denial of service vulnerabilities exist within ntpd that manifest themselves due to ntpd failing to properly validate input received via private mode packets or a remote configuration file. An adversary who crafts a specially formatted packet and transmits it to an ntpd server, or who crafts a specially formatted configuration file and transmits it to the ntpd server could cause the server daemon to crash or enter an infinite loop. Aleksandar Nikolic and Yves Younan of Cisco Talos are credited with the discovery of these vulnerabilities.
  • CVE-2015-7848 - Network Time Protocol Multiple Integer Overflow Read Access Violations
  • CVE-2015-7850 - Network Time Protocol Remote Configuration Denial of Service Vulnerability

Directory Traversal / File Overwrite

A file path traversal vulnerability exists within ntpd that manifests when saving a config file on VMS operating systems, potentially resulting in files being overwritten. An adversary would need to provide a malicious path in the configuration file to exploit this vulnerability. Yves Younan of Cisco Talos is credited with the discovery of this vulnerability.
  • CVE-2015-7851 - Network Time Protocol saveconfig Directory Traversal Vulnerability

Known Vulnerable Versions

  • ntp 4.2.5p186 though ntp 4.2.8p3
  • ntp-dev.4.3.70

Cisco remains committed to improving the overall security of the products and services our customers rely on by assessing the security of all software components that are used in our products. Through the research efforts by Talos and ASIG to identify vulnerabilities in ntpd, Cisco is able to assist the CII in improving the overall security of open source software components the overall community relies on. In response to these vulnerability disclosures, Cisco is taking the following actions to help address our customer's concerns.

Cisco PSIRT has posted a Security Advisory enumerating which Cisco products are affected by these ntpd vulnerabilities. You can find the Cisco Security Advisory here:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-ntp


In addition, Talos has released rules that detect attempts to exploit these vulnerabilities to protect our customers. Please note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Defense Center, FireSIGHT Management Center or Snort.org.

Snort Rules: 35831, 36250-36253, 36536

For additional information and vulnerability reports visit:
http://talosintel.com/vulnerability-reports/

5 comments:

  1. So now let's see if Cisco is going to pay the one and only person who works on ntpd in his spare time to actually fix the problems they discovered. The fact that critical infrastructure of the Internet is reliant on the shaky finances of one man in Talent, Oregon is appalling.

    ReplyDelete
    Replies
    1. We worked with the authors of the software to ensure the vulnerabilities are patched before we release any details.

      Delete
  2. Is your research related to the paper announced yesterday about attacks on NTP that can defeat HTTPS. Do any your discovered bugs result in the attacks in the paper.

    ReplyDelete
  3. Can we use this URL in the Knowledge Vault as
    (#threats #report #advanced #com #monitoring #ntpd #ntp #vulnerability #cisco #talos #directorytraversal #remotedos #memorycorruption #authenticationbypass #crypto #CVE-2015-7871 #CVE-2015-7849 #CVE-2015-7852 #CVE-2015-7853 #CVE-2015-7854 #CVE-2015-7848 #CVE-2015-7850 #CVE-2015-7851)?
    https://docs.google.com/spreadsheets/d/17IuPDavAW-ZjsvpLhFDHQ5e4IlzBG2jowDFb5ozg1CM/edit?usp=sharing
    This is part of Security Culture Initiative
    https://drive.google.com/file/d/0B0TkBywht9JSM1YxLXk5NWhRdnM/view?usp=docslist_api

    ReplyDelete

Post a Comment