Monday, February 17, 2025
HomeUncategorizedNTP patch for Dos exploit released

NTP patch for Dos exploit released

Published on

SIEM as a Service

Follow Us on Google News

NTP can be exploited to generate huge volumes of junk traffic which leads to DOS attack. Update your NTP service to ntp-4.2.8p9 which patches this Vulnerability.

What is NTP?

Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks.  NTP is one of the oldest Internet protocols in current use.

NTP users are strongly recommended to take immediate action to ensure that their NTP servers are not being vulnerable DDoS (distributed denial-of-service) attacks.

ntpdoz
NTF’s NTP Project -4.2.8p9, addresses:
  • 1 HIGH severity vulnerability that only affects Windows
  • 2 MEDIUM severity vulnerabilities
  • 2 MEDIUM/LOW severity vulnerabilities
  • 5 LOW severity vulnerabilities

For more details on Vulnerability Announcement refer NTP security advisory.NTP.org’s ntpd prior to version 4.2.8p9 contains multiple denial of service vulnerabilities.

CWE-476: NULL Pointer Dereference – CVE-2016-9311
CWE-400: Uncontrolled Resource Consumption (‘Resource Exhaustion’) – CVE-2016-9310
CWE-400: Uncontrolled Resource Consumption (‘Resource Exhaustion’) – CVE-2016-7427
CWE-400: Uncontrolled Resource Consumption (‘Resource Exhaustion’) – CVE-2016-7428
CWE-410: Insufficient Resource Pool – CVE-2016-9312
CWE-20: Improper Input Validation – CVE-2016-7431
CWE-20: Improper Input Validation – CVE-2016-7434
CWE-605: Multiple Binds to the Same Port – CVE-2016-7429
CWE-410: Insufficient Resource Pool – CVE-2016-7426
CWE-682: Incorrect Calculation – CVE-2016-7433

For more information, please see NTP.org’s security advisory.The CVSS score below is based on CVE-2016-9312.

Impact

A remote unauthenticated attacker may be able to perform a denial of service on ntpd.

Solution

Implement BCP-38

Use “restrict default noquery …” in your ntp.conf file. Only allow mode 6 queries from trusted networks and hosts.

Apply an update

Upgrade to 4.2.8p9, or later, from the NTP Project Download Page or the NTP Public Services Project Download Page.

Monitor ntpd

Properly monitor your ntpd instances, and auto-restart ntpd (without -g) if it stops running.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Stealthy Malware in WordPress Sites Enables Remote Code Execution by Hackers

Security researchers have uncovered sophisticated malware targeting WordPress websites, leveraging hidden backdoors to enable...

Xerox Printer Vulnerability Exposes Authentication Data Via LDAP and SMB

A critical security vulnerability in Xerox’s Versalink C7025 Multifunction Printer (MFP) has been uncovered,...

New XCSSET Malware Targets macOS Users Through Infected Xcode Projects

Microsoft Threat Intelligence has identified a new variant of the XCSSET macOS malware, marking...

Beware! Fake Outlook Support Calls Leading to Ransomware Attacks

Telekom Security has recently uncovered a significant vishing (voice phishing) campaign targeting individuals and...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Shut Down Phishing Attacks -Detection & Prevention Checklist

In today's interconnected world, where digital communication and transactions dominate, phishing attacks have become...

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

10 Best Linux Distributions In 2024

The Linux Distros is generally acknowledged as the third of the holy triplet of...