Vulnerability Name:

CVE-2014-9750 (CCN-109527)

Assigned:2015-02-04
Published:2015-02-04
Updated:2020-06-18
Summary:ntp_crypto.c in ntpd in NTP 4.x before 4.2.8p1, when Autokey Authentication is enabled, allows remote attackers to obtain sensitive information from process memory or cause a denial of service (daemon crash) via a packet containing an extension field with an invalid value for the length of its value field.
CVSS v3 Severity:4.8 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L)
4.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): Partial
4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): Partial
2.6 Low (REDHAT CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-20
Vulnerability Consequences:Obtain Information
References:Source: CONFIRM
Type: Issue Tracking, Patch, Vendor Advisory
http://bugs.ntp.org/show_bug.cgi?id=2671

Source: MITRE
Type: CNA
CVE-2014-9750

Source: REDHAT
Type: Third Party Advisory
RHSA-2015:1459

Source: CCN
Type: NTP Web site
SecurityNotice Main NTP

Source: CONFIRM
Type: Release Notes, Vendor Advisory
http://support.ntp.org/bin/view/Main/SecurityNotice#December_2014_NTP_Security_Vulne

Source: DEBIAN
Type: Third Party Advisory
DSA-3388

Source: CCN
Type: IBM Security Bulletin T1023291
IBM Pure Power Integrated Manager (PPIM) is affected by vulnerabilities in ntp (CVE-2014-9750, CVE-2014-9751)

Source: CCN
Type: IBM Security Bulletin T1023431 (PowerKVM)
Multiple vulnerabilities in Network Time Protocol (NTP) affect PowerKVM

Source: CCN
Type: IBM Security Bulletin 1977803 (PureData System for Analytics)
Multiple Security Vulnerabilities affecting IBM Netezza Host Management

Source: CCN
Type: US-CERT VU#852879
Network Time Protocol (NTP) Project NTP daemon (ntpd) contains multiple vulnerabilities

Source: CERT-VN
Type: Third Party Advisory, US Government Resource
VU#852879

Source: CONFIRM
Type: Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html

Source: BID
Type: Third Party Advisory, VDB Entry
72583

Source: CCN
Type: BID-72583
NTP 'ntp_crypto.c' Information Disclosure Vulnerability

Source: CCN
Type: Red Hat Bugzilla – Bug 1184573
(CVE-2014-9297, CVE-2014-9750) CVE-2014-9297 CVE-2014-9750 ntp: vallen in extension fields are not validated

Source: CONFIRM
Type: Issue Tracking, Patch, Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1184573

Source: XF
Type: UNKNOWN
ntp-cve20149750-info-disc(109527)

Source: CONFIRM
Type: Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03886en_us

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2014-9750

Vulnerable Configuration:Configuration 1:
  • cpe:/a:ntp:ntp:*:*:*:*:*:*:*:* (Version >= 4.2.0 and < 4.2.8)
  • OR cpe:/a:ntp:ntp:4.2.8:-:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:debian:debian_linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:oracle:linux:7:-:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:*

  • Configuration RedHat 9:
  • cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:*

  • Configuration RedHat 10:
  • cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:ntp:ntp:4.2.7:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:puredata_system:1.0.0:*:*:*:analytics:*:*:*
  • OR cpe:/a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:powerkvm:3.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.cisecurity:def:304
    P
    DSA-3388-1 ntp -- security update
    2016-02-08
    oval:com.redhat.rhsa:def:20152231
    P
    RHSA-2015:2231: ntp security, bug fix, and enhancement update (Moderate)
    2015-11-19
    oval:com.ubuntu.precise:def:20149750000
    V
    CVE-2014-9750 on Ubuntu 12.04 LTS (precise) - low.
    2015-10-05
    oval:com.ubuntu.trusty:def:20149750000
    V
    CVE-2014-9750 on Ubuntu 14.04 LTS (trusty) - low.
    2015-10-05
    oval:com.redhat.rhsa:def:20151459
    P
    RHSA-2015:1459: ntp security, bug fix, and enhancement update (Moderate)
    2015-07-22
    BACK
    ntp ntp *
    ntp ntp 4.2.8 -
    redhat enterprise linux desktop 6.0
    redhat enterprise linux server 6.0
    redhat enterprise linux workstation 6.0
    debian debian linux 7.0
    debian debian linux 8.0
    debian debian linux 9.0
    oracle linux 7 -
    ntp ntp 4.2.7
    ibm puredata system 1.0.0
    ibm powerkvm 2.1
    ibm powerkvm 3.1