NTP BUG 3044: Processing spoofed server packets
Last update: April 22, 2024 18:49 UTC (7e7bd5857)
Summary
Description
An attacker who is able to spoof packets with correct origin timestamps from enough servers before the expected response packets arrive at the target machine can affect some peer variables and, for example, cause a false leap indication to be set.
Mitigation
- Implement BCP-38.
- Upgrade to 4.2.8p8 or later.
- Properly monitor your
ntpd
instances, and auto-restart ntpd
(without -g
) if it stops running.
Credit
This weakness was discovered by Jakub Prokes of Red Hat.
Timeline