Description
ntp-keygen in ntp 4.2.8px before 4.2.8p2-RC2 and 4.3.x before 4.3.12 does not generate MD5 keys with sufficient entropy on big endian machines when the lowest order byte of the temp variable is between 0x20 and 0x7f and not #, which might allow remote attackers to obtain the value of generated MD5 keys via a brute force attack with the 93 possible keys.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3388-1 | ntp security update |
EUVD |
EUVD-2015-3449 | ntp-keygen in ntp 4.2.8px before 4.2.8p2-RC2 and 4.3.x before 4.3.12 does not generate MD5 keys with sufficient entropy on big endian machines when the lowest order byte of the temp variable is between 0x20 and 0x7f and not #, which might allow remote attackers to obtain the value of generated MD5 keys via a brute force attack with the 93 possible keys. |
References
History
No history.
Subscriptions
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Ntp
Subscribe
Ntp
Subscribe
Opensuse
Subscribe
Suse Linux Enterprise Server
Subscribe
Opensuse Project
Subscribe
Suse Linux Enterprise Desktop
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux For Ibm Z Systems
Subscribe
Enterprise Linux For Power Big Endian
Subscribe
Enterprise Linux For Scientific Computing
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Server From Rhui 6
Subscribe
Enterprise Linux Workstation
Subscribe
Suse
Subscribe
Suse Linux Enterprise Server
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T05:47:57.539Z
Reserved: 2015-04-23T00:00:00.000Z
Link: CVE-2015-3405
No data.
Status : Deferred
Published: 2017-08-09T16:29:00.190
Modified: 2025-04-20T01:37:25.860
Link: CVE-2015-3405
OpenCVE Enrichment
No data.
Debian DSA
EUVD