CVE-2015-5300Improper Input Validation in NTP

Severity
7.5HIGHNVD
EPSS
36.8%
top 2.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 21
Latest updateMay 14

Description

The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages16 packages

Debianntp/ntp< 1:4.2.8p4+dfsg-2
NVDntp/ntp4.2.8
NVDsuse/manager2.1
NVDopensuse/leap42.1

Also affects: Debian Linux 7.0, 8.0, Fedora 21, 22, Ubuntu Linux 12.04, 14.04, 15.04, 15.10, Enterprise Linux 6.7.z, 7.1

Patches

🔴Vulnerability Details

4
GHSA
GHSA-28h7-c4wm-4753: The panic_gate check in NTP before 42022-05-14
OSV
php7.2, php7.4 vulnerabilities2022-03-03
CVEList
CVE-2015-5300: The panic_gate check in NTP before 42017-07-21
OSV
CVE-2015-5300: The panic_gate check in NTP before 42017-07-21

📋Vendor Advisories

4
BSD
FreeBSD-SA-16:02.ntp: ntp panic threshold bypass vulnerability2016-01-14
Ubuntu
NTP vulnerabilities2015-10-27
Red Hat
ntp: MITM attacker can force ntpd to make a step larger than the panic threshold2015-10-21
Debian
CVE-2015-5300: ntp - The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first ch...2015

💬Community

3
Bugzilla
CVE-2015-7704 CVE-2015-5300 ntp: two flaws [fedora-all]2015-10-22
Bugzilla
CVE-2015-5300 ntp: MITM attacker can force ntpd to make a step larger than the panic threshold [fedora-all]2015-10-22
Bugzilla
CVE-2015-5300 ntp: MITM attacker can force ntpd to make a step larger than the panic threshold2015-10-13