{
  "threat_severity" : "Moderate",
  "public_date" : "2016-01-20T00:00:00Z",
  "bugzilla" : {
    "description" : "ntp: off-path denial of service on authenticated broadcast mode",
    "id" : "1300271",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1300271"
  },
  "cvss" : {
    "cvss_base_score" : "5.8",
    "cvss_scoring_vector" : "AV:N/AC:M/Au:N/C:N/I:P/A:P",
    "status" : "verified"
  },
  "cwe" : "CWE-20",
  "details" : [ "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (client-server association tear down) by sending broadcast packets with invalid authentication to a broadcast client.", "It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time." ],
  "statement" : "This issue affects the versions of ntp as shipped with Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue in Red Hat Enterprise Linux 6 and 7. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2016-05-31T00:00:00Z",
    "advisory" : "RHSA-2016:1141",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "ntp-0:4.2.6p5-10.el6.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.7 Extended Update Support",
    "release_date" : "2016-08-03T00:00:00Z",
    "advisory" : "RHSA-2016:1552",
    "cpe" : "cpe:/o:redhat:rhel_eus:6.7",
    "package" : "ntp-0:4.2.6p5-5.el6_7.5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2016-05-31T00:00:00Z",
    "advisory" : "RHSA-2016:1141",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "ntp-0:4.2.6p5-22.el7_2.2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2016-11-03T00:00:00Z",
    "advisory" : "RHSA-2016:2583",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "ntp-0:4.2.6p5-25.el7"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Will not fix",
    "package_name" : "ntp",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2015-7979\nhttps://nvd.nist.gov/vuln/detail/CVE-2015-7979\nhttp://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit\nhttp://www.talosintel.com/reports/TALOS-2016-0076/" ],
  "name" : "CVE-2015-7979",
  "mitigation" : {
    "value" : "Do not use NTP's broadcast mode by not configuring the \"broadcast\" directive in the ntp.conf file.",
    "lang" : "en:us"
  },
  "csaw" : false
}