Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 590478 (CVE-2016-6301) - <sys-apps/busybox-1.25.1: NTP server denial of service flaw (CVE-2016-6301)
Summary: <sys-apps/busybox-1.25.1: NTP server denial of service flaw (CVE-2016-6301)
Status: RESOLVED FIXED
Alias: CVE-2016-6301
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: A3 [glsa cve]
Keywords:
: 621128 (view as bug list)
Depends on: 598784 600106
Blocks:
  Show dependency tree
 
Reported: 2016-08-04 15:31 UTC by Agostino Sarubbo
Modified: 2017-06-07 19:59 UTC (History)
2 users (show)

See Also:
Package list:
=sys-apps/busybox-1.25.1
Runtime testing required: ---
kensington: sanity-check+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2016-08-04 15:31:10 UTC
From ${URL} :

The busybox NTP implementation doesn't check the NTP mode of packets received on the server port and responds to any packet with the right size. This 
includes responses from another NTP server. An attacker can send a packet with a spoofed source address in order to create an infinite loop of responses 
between two busybox NTP servers. Adding more packets to the loop increases the traffic between the servers until one of them has a fully loaded CPU 
and/or network.

It seems this bug was actually inherited from openntpd, on which the busybox implementation was based on. In openntpd it was fixed in:

https://github.com/openntpd-portable/openntpd-openbsd/commit/28a2f904aafbf4c209fe6fa04ffb9308740fd78a

Busybox upstream patch:

https://git.busybox.net/busybox/commit/?id=150dc7a2b483b8338a3e185c478b4b23ee884e71


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 SpanKY gentoo-dev 2016-12-09 21:19:08 UTC
this is in the 1.25.1 release which should be fine for stable
Comment 2 Thomas Deutschmann (RETIRED) gentoo-dev 2016-12-10 20:10:37 UTC
@ Arches,

please test and mark stable: =sys-apps/busybox-1.25.1
Comment 3 Tobias Klausmann (RETIRED) gentoo-dev 2016-12-12 15:57:53 UTC
Stable on alpha.
Comment 4 Agostino Sarubbo gentoo-dev 2016-12-13 11:05:36 UTC
amd64 stable
Comment 5 Agostino Sarubbo gentoo-dev 2016-12-13 11:31:04 UTC
x86 stable
Comment 6 Markus Meier gentoo-dev 2016-12-17 15:25:55 UTC
arm stable
Comment 7 Agostino Sarubbo gentoo-dev 2016-12-19 14:37:13 UTC
sparc stable
Comment 8 Agostino Sarubbo gentoo-dev 2016-12-19 15:14:04 UTC
ia64 stable
Comment 9 Agostino Sarubbo gentoo-dev 2016-12-20 09:46:29 UTC
ppc stable
Comment 10 SpanKY gentoo-dev 2016-12-22 06:15:05 UTC
done the rest now
Comment 11 GLSAMaker/CVETool Bot gentoo-dev 2017-01-01 12:17:58 UTC
CVE-2016-6301 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6301):
  The recv_and_process_client_pkt function in networking/ntpd.c in busybox
  allows remote attackers to cause a denial of service (CPU and bandwidth
  consumption) via a forged NTP packet, which triggers a communication loop.
Comment 12 GLSAMaker/CVETool Bot gentoo-dev 2017-01-01 15:37:49 UTC
This issue was resolved and addressed in
 GLSA 201701-05 at https://security.gentoo.org/glsa/201701-05
by GLSA coordinator Thomas Deutschmann (whissi).
Comment 13 Thomas Deutschmann (RETIRED) gentoo-dev 2017-06-07 19:59:01 UTC
*** Bug 621128 has been marked as a duplicate of this bug. ***