Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

[R3] Tenable Appliance Affected by NTP Vulnerabilities

Medium

Synopsis

The Tenable Appliance ships with the Network Time Protocol (NTP) service. Recently, several vulnerabilities were identified by a third-party and fixed by the vendor. Some of these issues may allow for remote code execution. The issues include:

  • NTP ntpd/ntp_crypto.c crypto_recv() Function Packet Handling Remote Stack Buffer Overflow
  • NTP ntpd/ntp_control.c configure() Function Packet Handling Remote Stack Buffer Overflow
  • NTP ntpd/ntp_control.c ctl_putdata() Function Packet Handling Remote Stack Buffer Overflow
  • NTP ntp-keygen MD5 Key Generation Weak RNG Seed MitM Issue
  • NTP Weak RSA Key Generation Modulus Unspecified Issue
  • NTP Extension Fields Missing vallen Validation Unspecified Issue
  • NTP Unspecified ::1 Spoofing Source IP ACL Bypass
  • NTP ntp_proto.c receive() Function Error Clause Missing return Statement Unspecified Weakness
  • NTP ntpd/ntp_config.c config_auth() Weak Default Key Generation

While the NTP service may allow remote traffic, best practices say that such an appliance should not be Internet accessible. If deployed in accordance with best practices, attacks would have to be conducted from an internal network.

Please note that Tenable strongly recommends that the appliance be installed on a subnet that is not Internet addressable.

Solution

Tenable has updated the Appliance to address these issues. If the Appliance is configured for automatic updating (by default, enabled on version 3.0.0 and later), simply click the Appliance 'update' button on the 'Updates' page. This will automatically download and install the patch. Customers still using an older 2.x.x release are strongly advised to upgrade to the latest version for new features and automatic updating.

This page contains information regarding security vulnerabilities that may impact Tenable's products. This may include issues specific to our software, or due to the use of third-party libraries within our software. Tenable strongly encourages users to ensure that they upgrade or apply relevant patches in a timely manner.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]

Risk Information

Tenable Advisory ID: TNS-2015-01
Risk Factor: Medium
CVSSv2 Base / Temporal Score
6.5 / 4.8
CVSSv2 Vector:
(AV:N/AC:L/Au:S/C:P/I:P/A:P/E:U/RL:OF/RC:C)

Affected Products

Tenable Appliance: 2.x.x, 3.0.0, 3.1.0, 3.2.0

Disclosure Timeline

2014-12-19 - Issues Disclosed
2015-01-09 - Tenable Patch Available

Advisory Timeline

2015-01-09 - [R1] Initial release
2016-11-17 - [R2] Adjust CVSSv2 score
2017-02-28 - [R3] Title standardization, adjust CVSS for worst-case scenario (AV:A -> AV:N), lurking typo