Vulnerability Name:

CVE-2015-5195 (CCN-107596)

Assigned:2015-08-25
Published:2015-08-25
Updated:2023-02-13
Summary:ntp_openssl.m4 in ntpd in NTP before 4.2.7p112 allows remote attackers to cause a denial of service (segmentation fault) via a crafted statistics or filegen configuration command that is not enabled during compilation.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
4.0 Medium (REDHAT CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-476
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2015-5195

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: CCN
Type: RHSA-2016-0780
Moderate: ntp security and bug fix update

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: CCN
Type: RHSA-2016-2583
Moderate: ntp security and bug fix update

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: CCN
Type: NTP Web site
NTF releases NTP Security patches in ntp-4.2.8p4

Source: CCN
Type: Cisco Security Advisory cisco-sa-20151021-ntp
Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: CCN
Type: IBM Security Bulletin T1024157 (SmartCloud Entry)
Ntp vulnerabilities affect IBM SmartCloud Entry

Source: CCN
Type: IBM Security Bulletin T1024775 (PowerKVM)
Vulnerabilities in NTP affect PowerKVM

Source: CCN
Type: IBM Security Bulletin 1985122 (Security Network Protection)
Multiple vulnerabilities in NTP affect IBM Security Network Protection

Source: CCN
Type: IBM Security Bulletin 1986956 (Security Identity Governance and Intelligence)
Vulnerabilities in Ntp affect IBM Security Identity Governance

Source: CCN
Type: IBM Security Bulletin 1988706 (Security Privileged Identity Manager)
Multiple Security Vulnerabilities fixed in IBM Security Privileged Identity Manager

Source: CCN
Type: IBM Security Bulletin 1989198 (Security Identity Manager)
Fixes for Multiple Security Vulnerabilities in IBM Security Identity Manager Virtual Appliance available

Source: CCN
Type: IBM Security Bulletin 1989542 (Security Access Manager for Web)
IBM Security Access Manager for Web is affected by vulnerabilities in NTP

Source: CCN
Type: IBM Security Bulletin 1989544 (Security Access Manager for Mobile)
IBM Security Access Manager for Mobile is affected by vulnerabilities in NTP

Source: secalert@redhat.com
Type: Mailing List, Patch, Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: BID-76474
NTP 'ntpd/ntp_config.c' Remote Denial of Service Vulnerability

Source: secalert@redhat.com
Type: Third Party Advisory, VDB Entry
secalert@redhat.com

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: CCN
Type: Red Hat Bugzilla – Bug 1254544
(CVE-2015-5195) CVE-2015-5195 ntp: ntpd crash when processing config commands with statistics type

Source: secalert@redhat.com
Type: Issue Tracking
secalert@redhat.com

Source: XF
Type: UNKNOWN
ntp-cve20155195-dos(107596)

Source: secalert@redhat.com
Type: Issue Tracking, Patch, Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2015-5195

Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*
  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*
  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:*
  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:*
  • Configuration RedHat 9:
  • cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:*
  • Configuration RedHat 10:
  • cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:ibm:security_access_manager:7.0:*:web:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0:*:web:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0:*:mobile:*:*:*:*:*
  • OR cpe:/a:ibm:smartcloud_entry:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:smartcloud_entry:3.2:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.0.1:*:mobile:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.0.2:*:mobile:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.0.3:*:mobile:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.0.4:*:mobile:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.0.2:*:web:*:*:*:*:*
  • OR cpe:/a:ibm:smartcloud_entry:2.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:smartcloud_entry:2.4:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.0.5:*:mobile:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.0.4:*:web:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.0.5:*:web:*:*:*:*:*
  • OR cpe:/a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_identity_manager:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.1:*:mobile:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.1:*:web:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.1.2:*:mobile:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.1.2:*:web:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.1.3:*:web:*:*:*:*:*
  • OR cpe:/a:ibm:security_privileged_identity_manager:2.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:security_network_protection_firmware:5.3.1:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:security_network_protection_firmware:5.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.1.3:*:mobile:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:9.0:*:mobile:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:9.0:*:web:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:9.0.0.1:*:web:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation:7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_identity_governance_and_intelligence:5.2.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation:6:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:9.0.1:*:web:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.1.4:*:mobile:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.1.4:*:web:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.trusty:def:20155195000
    V
    CVE-2015-5195 on Ubuntu 14.04 LTS (trusty) - negligible.
    2017-07-21
    oval:com.redhat.rhsa:def:20162583
    P
    RHSA-2016:2583: ntp security and bug fix update (Moderate)
    2016-11-03
    oval:com.redhat.rhsa:def:20160780
    P
    RHSA-2016:0780: ntp security and bug fix update (Moderate)
    2016-05-10
    oval:org.cisecurity:def:304
    P
    DSA-3388-1 ntp -- security update
    2016-02-08
    oval:com.ubuntu.precise:def:20155195000
    V
    CVE-2015-5195 on Ubuntu 12.04 LTS (precise) - negligible.
    2015-08-25
    BACK
    ibm security access manager 7.0
    ibm security access manager 8.0
    ibm security access manager 8.0
    ibm smartcloud entry 3.1
    ibm smartcloud entry 3.2
    ibm security access manager 8.0.0.1
    ibm security access manager 8.0.0.2
    ibm security access manager 8.0.0.3
    ibm security access manager 8.0.0.4
    ibm security access manager 8.0.0.2
    ibm smartcloud entry 2.3
    ibm smartcloud entry 2.4
    ibm security access manager 8.0.0.5
    ibm security access manager 8.0.0.4
    ibm security access manager 8.0.0.5
    ibm powerkvm 2.1
    ibm security identity manager 7.0
    ibm security access manager 8.0.1
    ibm security access manager 8.0.1
    ibm security access manager 8.0.1.2
    ibm security access manager 8.0.1.2
    ibm security access manager 8.0.1.3
    ibm security privileged identity manager 2.0.2
    ibm security network protection firmware 5.3.1
    ibm security network protection firmware 5.3.2
    ibm powerkvm 3.1
    ibm security access manager 8.0.1.3
    ibm security access manager 9.0
    ibm security access manager 9.0
    ibm security access manager for web 9.0.0.1 -
    redhat enterprise linux desktop 7
    redhat enterprise linux hpc node 7
    redhat enterprise linux server 7
    redhat enterprise linux workstation 7
    ibm security identity governance and intelligence 5.2.1
    redhat enterprise linux desktop 6
    redhat enterprise linux hpc node 6
    redhat enterprise linux server 6
    redhat enterprise linux workstation 6
    ibm security access manager for web 9.0.1 -
    ibm security access manager 8.0.1.4
    ibm security access manager for web 8.0.1.4