BSA-2017-226

Brocade Fabric OS

2 more products

21489

31 March 2017

31 March 2017

Closed

Low

3.0

N/A

CVE-2016-7426

Summary

Security Advisory ID : BSA-2017-226

Component : ntp

Revision : 1.0: Interim

The broadcast mode of NTP is expected to only be used in a trusted network. If the broadcast network is accessible to an attacker, a potentially exploitable denial of service vulnerability in ntpd's broadcast mode poll interval enforcement functionality can be abused. To limit abuse, ntpd restricts the rate at which each broadcast association will process incoming packets. ntpd will reject broadcast mode packets that arrive before the poll interval specified in the preceding broadcast packet expires. An attacker with access to the NTP broadcast domain can send specially crafted broadcast mode NTP packets to the broadcast domain which, while being logged by ntpd, will cause ntpd to reject broadcast mode packets from legitimate NTP broadcast servers.

Affected Products

Product Current Assessment
Brocade Services Director Impacted: Fixed in 17.1.

Products Confirmed Not Vulnerable

Brocade FastIron OS, Brocade NetIron OS, Brocade Network Advisor, Brocade SDN Controller, Brocade ServerIron ADX, Brocade SLX-OS, Brocade Virtual ADX, Brocade Virtual Traffic Manager: Software, and Brocade Virtual Web Application Firewall are confirmed not affected by this vulnerability.

Workaround

There are no workarounds that address this vulnerability.

Revision History

Version Change Date
1.0 Initial Publication August 25, 2017
1.0 Initial Publication March 31, 2017