Summary: | <net-misc/ntp-4.2.4_p7-r1 Mode 7 message loop Denial of service (CVE-2009-3563) | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | Gentoo Security | Reporter: | Robert Buchholz (RETIRED) <rbu> | ||||||
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> | ||||||
Status: | RESOLVED FIXED | ||||||||
Severity: | normal | CC: | base-system, jer | ||||||
Priority: | High | ||||||||
Version: | unspecified | ||||||||
Hardware: | All | ||||||||
OS: | Linux | ||||||||
URL: | http://www.kb.cert.org/vuls/id/568372 | ||||||||
Whiteboard: | A3 [glsa] | ||||||||
Package list: | Runtime testing required: | --- | |||||||
Attachments: |
|
Description
Robert Buchholz (RETIRED)
![]() Created attachment 208517 [details, diff]
ntp-4.2.4_p7-CVE-2009-3563.patch
Created attachment 208519 [details]
ntp-4.2.4_p7-r1.ebuild
Arch Security Liaisons, please test the attached ebuild and report it stable on this bug. Target keywords : "alpha amd64 arm hppa ia64 ppc ppc64 s390 sh sparc x86" CC'ing current Liaisons: alpha : armin76, klausman amd64 : keytoaster, chainsaw hppa : jer ppc : josejx, ranger ppc64 : josejx, ranger sparc : fmccor x86 : fauli, maekke HPPA is OK. Correcting liaisons. x86 ok sparc ok ppc/ppc64 are okay. amd64 is fine. this bug is public now. someone from security will unrestrict the bug as I am just too tired for that now ;) *** Bug 296350 has been marked as a duplicate of this bug. *** *** Bug 296350 has been marked as a duplicate of this bug. *** Public via $URL. base-system: please commit ebuild to the tree with stable keywords as follows: "amd64 hppa ppc ppc64 sparc x86" alpha, arm, ia64, s390, and sh: Please stabilize when bumped. CVE-2009-3563 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3563): ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons. Bumped. GLSA request filed. alpha/arm/ia64/s390/sh stable GLSA 201001-01 Yesterday on my network, the DDoS condition had occurred. Performed the recommended upgrade. Stopped ntpd on both sides of the connection, and then started them back up. The DDoS started again almost immediately. 100% CPU utilization on the client, 50% CPU utilization on the server. 3.5 MB/s of constant NTP traffic between the hosts. If possible, I would like this bug reopened. I'm wondering how that could happen. Do you have pcap dump you can send? http://www.hamiltonshells.ca/~chris/storage/other/dump-2010-01-26-18:11:40.log http://www.hamiltonshells.ca/~chris/storage/other/dump-2010-01-26-19:10:37.log I capped these last night while I was in #ntp. ~20MB each, they run for about 5 seconds. A lot of packets here. I just noticed that craig@g.o. is now on away until the summer. Can I please have someone check this stuff for me? I'd like my CPU time and bandwidth back. And if you don't believe that I'm using the right version... http://www.hamiltonshells.ca/~chris/storage/other/shell-ntp.txt http://www.hamiltonshells.ca/~chris/storage/other/poweredge-ntp.txt http://www.hamiltonshells.ca/~chris/images/screenshots/busted-ntp.png FYI: I'm not away till summer, just one more week (depending on circumstances +1 month maybe). ;) I find it rather hard to believe that only one person can help me with this issue. CVE to GLSA took less than 24 hours, but I've been waiting for over 2 weeks to get help regarding the same issue. If I have to wait another month to get some assistance, I'll seriously be considering Debian or BSD when I buy and upgrade my current network to a hardened architecture. a) Your problem seems be some other network glitch as this was patched already. I'm not very keen to analyse your network problems in my free time. To your very great suprise, others members from the security team will most likely feel the same way. b) If you want fixed timeframes in which your problems are solved, I suggest you buy a distro with professional support (RHEL or SLES) and do not run a distribution that is run by volunteers in their free time. c) You're free to become a developer yourself or to get out strace & gdb. If you're not able to do that, you might consider calling a consultant that can fix your problems. d) Don't forget that you neither payed anything, nor did gentoo promise you anything; you cannot scare anyone by saying you will use Debian or BSD. Why should anyone care at all? It will rather make everyone laugh. e) I will not touch this bug for one month from now on, so that you have enough time to think about b) (or analyse your problems yourself). Writing this has already been a waste of time, I will not take part in any further discussion about the whole issue and am not available until 07th march. |