CVE-2005-2496
CVSS4.6
发布时间 :2005-09-02 13:03:00
修订时间 :2011-03-07 21:24:36
NMCOPS    

[原文]The xntpd ntp (ntpd) daemon before 4.2.0b, when run with the -u option and using a string to specify the group, uses the group ID of the user instead of the group, which causes xntpd to run with different privileges than intended.


[CNNVD]NTPD 不安全权限漏洞(CNNVD-200509-032)

        xntpd是关于网络时间协议的守护进程,它遵循了因特网时间服务器的通用标准。
        xntpd ntp (ntpd)后台进程4.2.0b以前的版本,当以-u选项运行并且使用一字符串指定组时,使用的是用户的组ID而非组。这使得xntpd可以以与预定权限不同的权限运行。

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:9669The xntpd ntp (ntpd) daemon before 4.2.0b, when run with the -u option and using a string to specify the group, uses the group ID of the use...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2496
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2496
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200509-032
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/22035
(PATCH)  XF  ntp-incorrect-group-permissions(22035)
http://www.vupen.com/english/advisories/2005/1561
(UNKNOWN)  VUPEN  ADV-2005-1561
http://www.securityspace.com/smysecure/catid.html?id=55155
(VENDOR_ADVISORY)  FEDORA  FEDORA-2005-812
http://secunia.com/advisories/16602
(VENDOR_ADVISORY)  SECUNIA  16602
http://www.securityfocus.com/bid/14673
(UNKNOWN)  BID  14673
http://www.redhat.com/support/errata/RHSA-2006-0393.html
(UNKNOWN)  REDHAT  RHSA-2006:0393
http://www.osvdb.org/19055
(UNKNOWN)  OSVDB  19055
http://www.mandriva.com/security/advisories?name=MDKSA-2005:156
(UNKNOWN)  MANDRAKE  MDKSA-2005:156
http://www.debian.org/security/2005/dsa-801
(UNKNOWN)  DEBIAN  DSA-801
http://securitytracker.com/id?1016679
(UNKNOWN)  SECTRACK  1016679
http://secunia.com/advisories/21464
(UNKNOWN)  SECUNIA  21464

- 漏洞信息

NTPD 不安全权限漏洞
中危 设计错误
2005-09-02 00:00:00 2005-10-20 00:00:00
远程  
        xntpd是关于网络时间协议的守护进程,它遵循了因特网时间服务器的通用标准。
        xntpd ntp (ntpd)后台进程4.2.0b以前的版本,当以-u选项运行并且使用一字符串指定组时,使用的是用户的组ID而非组。这使得xntpd可以以与预定权限不同的权限运行。

- 公告与补丁

        暂无数据

- 漏洞信息 (F39849)

Debian Linux Security Advisory 801-1 (PacketStormID:F39849)
2005-09-07 00:00:00
Debian  debian.org
advisory
linux,suse,debian
CVE-2005-2496
[点击下载]

Debian Security Advisory DSA 801-1 - SuSE developers discovered that ntp confuses the given group id with the group id of the given user when called with a group id on the commandline that is specified as a string and not as a numeric gid, which causes ntpd to run with different privileges than intended.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 801-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
September 5th, 2005                     http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : ntp
Vulnerability  : programming error
Problem-Type   : local
Debian-specific: no
CVE ID         : CAN-2005-2496

SuSE developers discovered that ntp confuses the given group id with
the group id of the given user when called with a group id on the
commandline that is specified as a string and not as a numeric gid,
which causes ntpd to run with different privileges than intended.

The old stable distribution (woody) is not affected by this problem.

For the stable distribution (sarge) this problem has been fixed in
version 4.2.0a+stable-2sarge1.

The unstable distribution (sid) is not affected by this problem.

We recommend that you upgrade your ntp-server package.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.0a+stable-2sarge1.dsc
      Size/MD5 checksum:      854 073a5db4d10747c018badaf285c8d673
    http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.0a+stable-2sarge1.diff.gz
      Size/MD5 checksum:   227920 18441676d886725e9772f50d6d66ed73
    http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.0a+stable.orig.tar.gz
      Size/MD5 checksum:  2272395 30f8b3d5b970c14dce5c6d8c922afa3e

  Architecture independent components:

    http://security.debian.org/pool/updates/main/n/ntp/ntp-doc_4.2.0a+stable-2sarge1_all.deb
      Size/MD5 checksum:   888700 65e345e5a4c5671c35c35c2321a57929

  Alpha architecture:

    http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.0a+stable-2sarge1_alpha.deb
      Size/MD5 checksum:   281984 8018bab983d1b1273d80f13c98ab043e
    http://security.debian.org/pool/updates/main/n/ntp/ntp-refclock_4.2.0a+stable-2sarge1_alpha.deb
      Size/MD5 checksum:   268648 6a928c73d9a35e5d46be564919bfc5b3
    http://security.debian.org/pool/updates/main/n/ntp/ntp-server_4.2.0a+stable-2sarge1_alpha.deb
      Size/MD5 checksum:    33048 1206c292d2aea812ab31bc6c82747a83
    http://security.debian.org/pool/updates/main/n/ntp/ntp-simple_4.2.0a+stable-2sarge1_alpha.deb
      Size/MD5 checksum:   157866 8129080e8d5a3efeeb35639a016455cc
    http://security.debian.org/pool/updates/main/n/ntp/ntpdate_4.2.0a+stable-2sarge1_alpha.deb
      Size/MD5 checksum:    48592 05084385b3fc719fc86ad052fa03417d

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.0a+stable-2sarge1_amd64.deb
      Size/MD5 checksum:   264728 7fcf78a01ddc8e476057626abec86301
    http://security.debian.org/pool/updates/main/n/ntp/ntp-refclock_4.2.0a+stable-2sarge1_amd64.deb
      Size/MD5 checksum:   214096 e50b5a1b4dc57d8717fff35a3e482e11
    http://security.debian.org/pool/updates/main/n/ntp/ntp-server_4.2.0a+stable-2sarge1_amd64.deb
      Size/MD5 checksum:    31970 0251dd0e396376bf7eddaab24011dba8
    http://security.debian.org/pool/updates/main/n/ntp/ntp-simple_4.2.0a+stable-2sarge1_amd64.deb
      Size/MD5 checksum:   129240 1c87bef079e38724a2c842001ba27444
    http://security.debian.org/pool/updates/main/n/ntp/ntpdate_4.2.0a+stable-2sarge1_amd64.deb
      Size/MD5 checksum:    44064 75f22981803941881927a8d5c81e95ef

  ARM architecture:

    http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.0a+stable-2sarge1_arm.deb
      Size/MD5 checksum:   257214 619dabee145fcc286294846d69d7d90c
    http://security.debian.org/pool/updates/main/n/ntp/ntp-refclock_4.2.0a+stable-2sarge1_arm.deb
      Size/MD5 checksum:   209646 1e134996fc09d8d0c93a7bfb4414c95a
    http://security.debian.org/pool/updates/main/n/ntp/ntp-server_4.2.0a+stable-2sarge1_arm.deb
      Size/MD5 checksum:    31368 3fe285ab9de86209226659ee91e07784
    http://security.debian.org/pool/updates/main/n/ntp/ntp-simple_4.2.0a+stable-2sarge1_arm.deb
      Size/MD5 checksum:   127812 d0a44d77818399c1dbffba95a0d2bb71
    http://security.debian.org/pool/updates/main/n/ntp/ntpdate_4.2.0a+stable-2sarge1_arm.deb
      Size/MD5 checksum:    42664 6e4e47990a6d0c296fee757c6f4f0d43

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.0a+stable-2sarge1_i386.deb
      Size/MD5 checksum:   255444 03cc653031d7be7ff023b66a59bc681e
    http://security.debian.org/pool/updates/main/n/ntp/ntp-refclock_4.2.0a+stable-2sarge1_i386.deb
      Size/MD5 checksum:   200168 7a5bc9c7071e9b4c48573aa0e1334013
    http://security.debian.org/pool/updates/main/n/ntp/ntp-server_4.2.0a+stable-2sarge1_i386.deb
      Size/MD5 checksum:    31284 82c3f7be081c0c49f7447c0a2bffe007
    http://security.debian.org/pool/updates/main/n/ntp/ntp-simple_4.2.0a+stable-2sarge1_i386.deb
      Size/MD5 checksum:   120276 e01e8f15ee6b755a71bc80662a9db60e
    http://security.debian.org/pool/updates/main/n/ntp/ntpdate_4.2.0a+stable-2sarge1_i386.deb
      Size/MD5 checksum:    41574 82575f5fbb7a6bf7d5b98ec9ea0cdfc8

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.0a+stable-2sarge1_ia64.deb
      Size/MD5 checksum:   302788 e9c9691a2effcb54e19e36637b8f4510
    http://security.debian.org/pool/updates/main/n/ntp/ntp-refclock_4.2.0a+stable-2sarge1_ia64.deb
      Size/MD5 checksum:   312428 82bbe1fcbfb03f64158b074116440c59
    http://security.debian.org/pool/updates/main/n/ntp/ntp-server_4.2.0a+stable-2sarge1_ia64.deb
      Size/MD5 checksum:    35044 b9100c5ee1d7bb7feeb42a931078cdd5
    http://security.debian.org/pool/updates/main/n/ntp/ntp-simple_4.2.0a+stable-2sarge1_ia64.deb
      Size/MD5 checksum:   179862 dce97a989ead971d6a2a92914cc27b4c
    http://security.debian.org/pool/updates/main/n/ntp/ntpdate_4.2.0a+stable-2sarge1_ia64.deb
      Size/MD5 checksum:    54388 c368e58b9ab51c7ee284962fb87df75f

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.0a+stable-2sarge1_hppa.deb
      Size/MD5 checksum:   268198 2fd7862ec6edb2fc494da2ddad4a04fd
    http://security.debian.org/pool/updates/main/n/ntp/ntp-refclock_4.2.0a+stable-2sarge1_hppa.deb
      Size/MD5 checksum:   223882 45e64eae438e54010678c4238561bbe7
    http://security.debian.org/pool/updates/main/n/ntp/ntp-server_4.2.0a+stable-2sarge1_hppa.deb
      Size/MD5 checksum:    32602 78cf25bd39bc1d32c7fe0717b85ebc0b
    http://security.debian.org/pool/updates/main/n/ntp/ntp-simple_4.2.0a+stable-2sarge1_hppa.deb
      Size/MD5 checksum:   132252 2a38c59d881fede586fe0a1188f68cb6
    http://security.debian.org/pool/updates/main/n/ntp/ntpdate_4.2.0a+stable-2sarge1_hppa.deb
      Size/MD5 checksum:    45084 6b16a8e6dd8a4e734c5c78a48a661d53

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.0a+stable-2sarge1_m68k.deb
      Size/MD5 checksum:   245984 0fd8a681ade16a07b93871b9f274c833
    http://security.debian.org/pool/updates/main/n/ntp/ntp-refclock_4.2.0a+stable-2sarge1_m68k.deb
      Size/MD5 checksum:   176774 0b0f69e0c66d6f884471d3f75ca97e7b
    http://security.debian.org/pool/updates/main/n/ntp/ntp-server_4.2.0a+stable-2sarge1_m68k.deb
      Size/MD5 checksum:    30962 370a2555328ef924fd184e705f481fbb
    http://security.debian.org/pool/updates/main/n/ntp/ntp-simple_4.2.0a+stable-2sarge1_m68k.deb
      Size/MD5 checksum:   108038 f40c34ae5aa890b32ba3ad7ae9d2ebcf
    http://security.debian.org/pool/updates/main/n/ntp/ntpdate_4.2.0a+stable-2sarge1_m68k.deb
      Size/MD5 checksum:    39940 52edbfdbe569a155f849e9cb1f171955

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.0a+stable-2sarge1_mips.deb
      Size/MD5 checksum:   268154 9135d6701c0ab87d77a73cc9850a0726
    http://security.debian.org/pool/updates/main/n/ntp/ntp-refclock_4.2.0a+stable-2sarge1_mips.deb
      Size/MD5 checksum:   233488 56e93ee7ecba66b6ebca7310cd564faa
    http://security.debian.org/pool/updates/main/n/ntp/ntp-server_4.2.0a+stable-2sarge1_mips.deb
      Size/MD5 checksum:    33926 fd4e4f7c6abd5ae4d106eb193944f616
    http://security.debian.org/pool/updates/main/n/ntp/ntp-simple_4.2.0a+stable-2sarge1_mips.deb
      Size/MD5 checksum:   138146 0e816e27f765f9a046127f4bb7163819
    http://security.debian.org/pool/updates/main/n/ntp/ntpdate_4.2.0a+stable-2sarge1_mips.deb
      Size/MD5 checksum:    46228 acb472598aa68bcc2e02f7fa76c39519

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.0a+stable-2sarge1_mipsel.deb
      Size/MD5 checksum:   270556 83a5301cef400a1c60ebab2a39907436
    http://security.debian.org/pool/updates/main/n/ntp/ntp-refclock_4.2.0a+stable-2sarge1_mipsel.deb
      Size/MD5 checksum:   242944 a6550d4d21423deecafbc8e5c24830b1
    http://security.debian.org/pool/updates/main/n/ntp/ntp-server_4.2.0a+stable-2sarge1_mipsel.deb
      Size/MD5 checksum:    33942 c2660bf5737ede43d3857a09ae83462d
    http://security.debian.org/pool/updates/main/n/ntp/ntp-simple_4.2.0a+stable-2sarge1_mipsel.deb
      Size/MD5 checksum:   146338 669c97272299c5d6f79cf0cec161a270
    http://security.debian.org/pool/updates/main/n/ntp/ntpdate_4.2.0a+stable-2sarge1_mipsel.deb
      Size/MD5 checksum:    46606 766f54b333ecafbce9f935c3013aa273

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.0a+stable-2sarge1_powerpc.deb
      Size/MD5 checksum:   266082 4b95908ba945a5981de225e7f08a08cf
    http://security.debian.org/pool/updates/main/n/ntp/ntp-refclock_4.2.0a+stable-2sarge1_powerpc.deb
      Size/MD5 checksum:   213172 40f7b322d123d4a0c07b0a72c88ea316
    http://security.debian.org/pool/updates/main/n/ntp/ntp-server_4.2.0a+stable-2sarge1_powerpc.deb
      Size/MD5 checksum:    31914 41f2214cbba83c953645d828cb08163c
    http://security.debian.org/pool/updates/main/n/ntp/ntp-simple_4.2.0a+stable-2sarge1_powerpc.deb
      Size/MD5 checksum:   129092 f278da81542a03b383117acdbc223045
    http://security.debian.org/pool/updates/main/n/ntp/ntpdate_4.2.0a+stable-2sarge1_powerpc.deb
      Size/MD5 checksum:    43684 67e6a656ad5786b54f5924b4d33f7da3

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.0a+stable-2sarge1_s390.deb
      Size/MD5 checksum:   262906 a5dba3ef8693a44ca7e53c750a7b602c
    http://security.debian.org/pool/updates/main/n/ntp/ntp-refclock_4.2.0a+stable-2sarge1_s390.deb
      Size/MD5 checksum:   209214 521113f21da1b4b125806dc673c13a41
    http://security.debian.org/pool/updates/main/n/ntp/ntp-server_4.2.0a+stable-2sarge1_s390.deb
      Size/MD5 checksum:    31812 f115ec3f6c74b884c2e8d6ed46c362e8
    http://security.debian.org/pool/updates/main/n/ntp/ntp-simple_4.2.0a+stable-2sarge1_s390.deb
      Size/MD5 checksum:   126366 2bea02161d8fe272b63e9ea73afd2634
    http://security.debian.org/pool/updates/main/n/ntp/ntpdate_4.2.0a+stable-2sarge1_s390.deb
      Size/MD5 checksum:    44204 b6c1d457ee2938707cc601ee533d4103

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.0a+stable-2sarge1_sparc.deb
      Size/MD5 checksum:   255138 2fa91e71128b89183d52bda74f4e6329
    http://security.debian.org/pool/updates/main/n/ntp/ntp-refclock_4.2.0a+stable-2sarge1_sparc.deb
      Size/MD5 checksum:   201106 945e6362db7bca49daa7f1ae91637b60
    http://security.debian.org/pool/updates/main/n/ntp/ntp-server_4.2.0a+stable-2sarge1_sparc.deb
      Size/MD5 checksum:    31398 578d29c5f031717a9a5cd7c5afa6f756
    http://security.debian.org/pool/updates/main/n/ntp/ntp-simple_4.2.0a+stable-2sarge1_sparc.deb
      Size/MD5 checksum:   120274 9cabce720603c3b96b168df882bb3230
    http://security.debian.org/pool/updates/main/n/ntp/ntpdate_4.2.0a+stable-2sarge1_sparc.deb
      Size/MD5 checksum:    42486 75b2d4cc418c402819f29249b329fcb0


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDHBbLW5ql+IAeqTIRAhBdAJ99T2pCQ6ib+q7teVOX01OtLnJzNgCdEe8+
bszVqBzbeL1fTElqoT21V3E=
=TU7a
-----END PGP SIGNATURE-----

    

- 漏洞信息

19055
NTP ntpd -u Group Permission Weakness

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-08-29 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 4.2.0b or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

NTPD Insecure Privileges Vulnerability
Design Error 14673
Yes No
2005-08-27 12:00:00 2006-09-05 11:33:00
Thomas Biege <thomas@suse.de> is credited with the discovery of this vulnerability.

- 受影响的程序版本

Ubuntu Ubuntu Linux 4.1 ppc
Ubuntu Ubuntu Linux 4.1 ia64
Ubuntu Ubuntu Linux 4.1 ia32
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux ES 4
RedHat Desktop 4.0
Red Hat Fedora Core3
Red Hat Enterprise Linux AS 4
NTP NTPd 4.2 .0a
NTP NTPd 4.2
NTP NTPd 4.1
NTP NTPd 4.0
NetBSD NetBSD 2.1
NetBSD NetBSD 2.0.3
NetBSD NetBSD 2.0.2
NetBSD NetBSD 2.0.1
NetBSD NetBSD 1.6.2
NetBSD NetBSD 1.6.1
NetBSD NetBSD 1.6 beta
NetBSD NetBSD 1.6
NetBSD NetBSD Current
Mandriva Linux Mandrake 10.2 x86_64
Mandriva Linux Mandrake 10.2
Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1
Conectiva Linux 10.0
NTP NTPd 4.2 .0b

- 不受影响的程序版本

NTP NTPd 4.2 .0b

- 漏洞讨论

The ntpd daemon is prone to an insecure privileges vulnerability.

The application may be started with the effective permissions of a privileged user; if the application is compromised by some other means, this may allow an attacker to conduct further exploits.

- 漏洞利用

No exploit is required.

- 解决方案

The vendor has released an update to correct this vulnerability.

Please see the referenced advisories for more information.


Red Hat Fedora Core3

Conectiva Linux 10.0

NTP NTPd 4.0

NTP NTPd 4.1

NTP NTPd 4.2

NTP NTPd 4.2 .0a

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站