漏洞描述
Network Time Protocol(NTP)是用来使计算机时间同步化的一种协议,它可以使计算机对其服务器或时钟源(如石英钟,GPS等等)做同步化。
NTP 4.0.90 <= ntpd < 4.2.8p9,NTP 4.3.x < 4.3.94版本的ntpd存在安全漏洞,远程攻击者可通过构造的数据造成ntpd空指针引用,利用此漏洞造成拒绝服务。
解决方法
厂商补丁:
NTP
---
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
http://support.ntp.org/bin/view/Main/SoftwareDownloads
参考链接:
http://support.ntp.org/bin/view/Main/NtpBug3119
http://www.kb.cert.org/vuls/id/633847
对于具体Linux发行版本中使用的版本,可以参考如下链接,确认是否受该漏洞影响:
CentOS:
https://lists.centos.org/pipermail/centos-announce/2017-February/022266.html
https://lists.centos.org/pipermail/centos-announce/2017-February/022267.html
SUSE:
https://www.suse.com/security/cve/CVE-2016-9311.html
FreeBSD:
http://support.ntp.org/bin/view/Main/SecurityNotice#November_2016_ntp_4_2_8p9_NTP_Se
https://vuxml.freebsd.org/freebsd/8db8d62a-b08b-11e6-8eba-d050996490d0.html
https://vuxml.freebsd.org/freebsd/fcedcdbb-c86e-11e6-b1cf-14dae9d210b8.html
Redhat:
https://rhn.redhat.com/errata/RHSA-2017-0252.html
AIX:
http://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc
http://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc
http://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc
http://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc
http://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc
http://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc
http://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc
EulerOS
----------------
链接:http://developer.huawei.com/ict/cn/site-euleros/euleros/cve/CVE-2016-9311