Memory Leak Affecting ntp package, versions <1:4.2.8p15-1
Threat Intelligence
EPSS
0.5% (77th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-NTP-573237
- published 24 Jun 2020
- disclosed 24 Jun 2020
Introduced: 24 Jun 2020
CVE-2020-15025 Open this link in a new tabHow to fix?
Upgrade Debian:11 ntp to version 1:4.2.8p15-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream ntp package and not the ntp package as distributed by Debian.
See How to fix? for Debian:11 relevant fixed versions and status.
ntpd in ntp 4.2.8 before 4.2.8p15 and 4.3.x before 4.3.101 allows remote attackers to cause a denial of service (memory consumption) by sending packets, because memory is not freed in situations where a CMAC key is used and associated with a CMAC algorithm in the ntp.keys file.
References
- https://security-tracker.debian.org/tracker/CVE-2020-15025
- https://security.netapp.com/advisory/ntap-20200702-0002/
- https://security.gentoo.org/glsa/202007-12
- https://bugs.gentoo.org/729458
- https://support.ntp.org/bin/view/Main/NtpBug3661
- https://support.ntp.org/bin/view/Main/SecurityNotice#June_2020_ntp_4_2_8p15_NTP_Relea
- https://www.oracle.com/security-alerts/cpujan2021.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html
CVSS Scores
version 3.1