Skip to navigation

Security Advisory Important: ntp security update

Advisory: RHSA-2009:1039-1
Type: Security Advisory
Severity: Important
Issued on: 2009-05-18
Last updated on: 2009-05-18
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.3.z server)
Red Hat Enterprise Linux Long Life (v. 5.3 server)
CVEs (cve.mitre.org): CVE-2009-0159
CVE-2009-1252

Details

An updated ntp package that fixes two security issues is now available for
Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

The Network Time Protocol (NTP) is used to synchronize a computer's time
with a referenced time source.

A buffer overflow flaw was discovered in the ntpd daemon's NTPv4
authentication code. If ntpd was configured to use public key cryptography
for NTP packet authentication, a remote attacker could use this flaw to
send a specially-crafted request packet that could crash ntpd.
(CVE-2009-1252)

Note: NTP authentication is not enabled by default.

A buffer overflow flaw was found in the ntpq diagnostic command. A
malicious, remote server could send a specially-crafted reply to an ntpq
request that could crash ntpq. (CVE-2009-0159)

All ntp users are advised to upgrade to this updated package, which
contains backported patches to resolve these issues. After installing the
update, the ntpd daemon will be restarted automatically.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
ntp-4.2.2p1-9.el5_3.2.src.rpm
File outdated by:  RHBA-2013:1800
    MD5: d1a009cd4dafa8a35afbe6ae307ef03d
 
IA-32:
ntp-4.2.2p1-9.el5_3.2.i386.rpm
File outdated by:  RHBA-2013:1800
    MD5: 400c3e9dc03caebac7fd1dfcb9401fba
 
IA-64:
ntp-4.2.2p1-9.el5_3.2.ia64.rpm
File outdated by:  RHBA-2013:1800
    MD5: 8261ab493644e39ec842672b4dee89b9
 
PPC:
ntp-4.2.2p1-9.el5_3.2.ppc.rpm
File outdated by:  RHBA-2013:1800
    MD5: c4a594159fe1c03043f8cef1232fc7cf
 
s390x:
ntp-4.2.2p1-9.el5_3.2.s390x.rpm
File outdated by:  RHBA-2013:1800
    MD5: 16f7e906e9b4eb5aa0ad30e1b4dd7646
 
x86_64:
ntp-4.2.2p1-9.el5_3.2.x86_64.rpm
File outdated by:  RHBA-2013:1800
    MD5: bb4d1381a91513fead07009e985c3691
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
ntp-4.2.2p1-9.el5_3.2.src.rpm
File outdated by:  RHBA-2013:1800
    MD5: d1a009cd4dafa8a35afbe6ae307ef03d
 
IA-32:
ntp-4.2.2p1-9.el5_3.2.i386.rpm
File outdated by:  RHBA-2013:1800
    MD5: 400c3e9dc03caebac7fd1dfcb9401fba
 
x86_64:
ntp-4.2.2p1-9.el5_3.2.x86_64.rpm
File outdated by:  RHBA-2013:1800
    MD5: bb4d1381a91513fead07009e985c3691
 
Red Hat Enterprise Linux EUS (v. 5.3.z server)

SRPMS:
ntp-4.2.2p1-9.el5_3.2.src.rpm
File outdated by:  RHBA-2013:1800
    MD5: d1a009cd4dafa8a35afbe6ae307ef03d
 
IA-32:
ntp-4.2.2p1-9.el5_3.2.i386.rpm     MD5: 400c3e9dc03caebac7fd1dfcb9401fba
 
IA-64:
ntp-4.2.2p1-9.el5_3.2.ia64.rpm     MD5: 8261ab493644e39ec842672b4dee89b9
 
PPC:
ntp-4.2.2p1-9.el5_3.2.ppc.rpm     MD5: c4a594159fe1c03043f8cef1232fc7cf
 
s390x:
ntp-4.2.2p1-9.el5_3.2.s390x.rpm     MD5: 16f7e906e9b4eb5aa0ad30e1b4dd7646
 
x86_64:
ntp-4.2.2p1-9.el5_3.2.x86_64.rpm     MD5: bb4d1381a91513fead07009e985c3691
 
Red Hat Enterprise Linux Long Life (v. 5.3 server)

SRPMS:
ntp-4.2.2p1-9.el5_3.2.src.rpm
File outdated by:  RHBA-2013:1800
    MD5: d1a009cd4dafa8a35afbe6ae307ef03d
 
IA-32:
ntp-4.2.2p1-9.el5_3.2.i386.rpm     MD5: 400c3e9dc03caebac7fd1dfcb9401fba
 
IA-64:
ntp-4.2.2p1-9.el5_3.2.ia64.rpm     MD5: 8261ab493644e39ec842672b4dee89b9
 
x86_64:
ntp-4.2.2p1-9.el5_3.2.x86_64.rpm     MD5: bb4d1381a91513fead07009e985c3691
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

490617 - CVE-2009-0159 ntp: buffer overflow in ntpq
499694 - CVE-2009-1252 ntp: remote arbitrary code execution vulnerability if autokeys is enabled


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/