copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2014.2519 - [Cisco] Cisco products: Multiple vulnerabilities

Date: 24 December 2014
References: ESB-2014.2472  ESB-2014.2473  ESB-2014.2476  ASB-2014.0145  ESB-2015.0006  ESB-2015.0008  ESB-2015.0029  ESB-2015.0341  ESB-2015.0363  ESB-2015.0535  


Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.2519
         Multiple Vulnerabilities in ntpd Affecting Cisco Products
                             24 December 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco products
Publisher:         Cisco Systems
Operating System:  Cisco
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Access Privileged Data          -- Existing Account      
                   Denial of Service               -- Remote/Unauthenticated
                   Provide Misleading Information  -- Existing Account      
                   Reduced Security                -- Existing Account      
Resolution:        Mitigation
CVE Names:         CVE-2014-9296 CVE-2014-9295 CVE-2014-9294
                   CVE-2014-9293  

Reference:         ASB-2014.0145
                   ESB-2014.2476
                   ESB-2014.2473
                   ESB-2014.2472

Original Bulletin: 
   http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141222-ntpd

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco Security Advisory: Multiple Vulnerabilities in ntpd Affecting Cisco
Products

Advisory ID: cisco-sa-20141222-ntpd

Revision 1.1

Last Updated  2014 December 23 13:37  UTC (GMT)

For Public Release 2014 December 22 16:00  UTC (GMT)

+---------------------------------------------------------------------

Summary
=======

Multiple Cisco products incorporate a version of the ntpd package. Versions
of this package are affected by one or more vulnerabilities that could allow
an unauthenticated, remote attacker to execute arbitrary code or create a
denial of service (DoS) condition. 

On December 19, 2014, NTP.org and US-CERT released security advisories
detailing two issues regarding weak cryptographic pseudorandom number
generation (PRNG), three buffer overflow vulnerabilities, and an unhandled
error condition with an unknown impact. The vulnerabilities are referenced
in this document as follows: 

* CVE-2014-9293: Weak Default Key in config_auth()
* CVE-2014-9294: Noncryptographic Random Number Generator with Weak Seed
Used by ntp-keygen to Generate Symmetric Keys
* CVE-2014-9295: Multiple Buffer Overflow Vulnerabilities in ntpd
* CVE-2014-9296: ntpd receive(): Missing Return on Error

This advisory will be updated as additional information becomes available. 

Cisco will release free software updates that address these vulnerabilities.


Workarounds that mitigate these vulnerabilities are available. 

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-s
a-20141222-ntpd

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (SunOS)
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=Ohet
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=9a81
-----END PGP SIGNATURE-----