ntp-keygen in ntp 4.2.8px before 4.2.8p2-RC2 and 4.3.x before 4.3.12 does not generate MD5 keys with sufficient entropy on big endian machines when the lowest order byte of the temp variable is between 0x20 and 0x7f and not #, which might allow remote attackers to obtain the value of generated MD5 keys via a brute force attack with the 93 possible keys.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Fedoraproject
Subscribe
|
Fedora
Subscribe
|
|
Ntp
Subscribe
|
Ntp
Subscribe
|
|
Opensuse
Subscribe
|
Suse Linux Enterprise Server
Subscribe
|
|
Opensuse Project
Subscribe
|
Suse Linux Enterprise Desktop
Subscribe
|
|
Redhat
Subscribe
|
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux For Ibm Z Systems
Subscribe
Enterprise Linux For Power Big Endian
Subscribe
Enterprise Linux For Scientific Computing
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Server From Rhui 6
Subscribe
Enterprise Linux Workstation
Subscribe
|
|
Suse
Subscribe
|
Suse Linux Enterprise Server
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3388-1 | ntp security update |
EUVD |
EUVD-2015-3449 | ntp-keygen in ntp 4.2.8px before 4.2.8p2-RC2 and 4.3.x before 4.3.12 does not generate MD5 keys with sufficient entropy on big endian machines when the lowest order byte of the temp variable is between 0x20 and 0x7f and not #, which might allow remote attackers to obtain the value of generated MD5 keys via a brute force attack with the 93 possible keys. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T05:47:57.539Z
Reserved: 2015-04-23T00:00:00.000Z
Link: CVE-2015-3405
No data.
Status : Deferred
Published: 2017-08-09T16:29:00.190
Modified: 2025-04-20T01:37:25.860
Link: CVE-2015-3405
OpenCVE Enrichment
No data.
Debian DSA
EUVD