NTP BUG 2945: 0rigin: Zero Origin Timestamp Bypass
Last update: April 22, 2024 18:49 UTC (7e7bd5857)
Summary
Description
To distinguish legitimate peer responses from forgeries, a client attempts to verify a response packet by ensuring that the origin timestamp in the packet matches the origin timestamp it transmitted in its last request. A logic error that allowed packets with an origin timestamp of zero to bypass this check whenever there is not an outstanding request to the server.
Mitigation
Credit
This weakness was discovered by Jonathan Gardner of Cisco ASIG.
Timeline