CVE-2015-1799
Description
The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
NTP ntpd symmetric-key state updates on invalid packets allow a MITM to desynchronize a client by spoofing a peer IP.
Vulnerability
The symmetric-key feature in the receive function in ntp_proto.c in ntpd (NTP 3.x and 4.x before 4.2.8p2) performs state-variable updates upon receiving certain invalid packets. This bug makes it easier for a man-in-the-middle attacker to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer [1][3].
Exploitation
An attacker who can spoof the source IP address of an NTP peer (typically requiring a network position that allows packet injection) can send crafted invalid packets to a victim ntpd. The symmetric-key association logic will process these packets and update internal state variables, eventually leading to loss of synchronization with the legitimate peer [1][3]. The attack is unauthenticated from the peer's perspective, though the attacker must know or guess the peer's IP address.
Impact
Successful exploitation results in a denial of service condition where the victim NTP client loses synchronization with its configured peer. The attacker does not gain code execution or information disclosure; the impact is limited to disruption of time synchronization [1][3]. Cisco and HPE advisories confirm the DoS impact [3][4].
Mitigation
Fixed in NTP 4.2.8p2 (released April 7, 2015). Red Hat released RHSA-2015:1459 for Red Hat Enterprise Linux [1]. Apple included updates in OS X Yosemite v10.10.4 [2]. Cisco and HPE have provided software updates for affected products [3][4]. If patching is not immediately possible, restricting NTP traffic to trusted peers via firewall rules or using authenticated symmetric-key associations with correct configuration can reduce exposure.
- http://rhn.redhat.com/errata/RHSA-2015-1459.html
- About the security content of OS X Yosemite v10.10.4 and Security Update 2015-005 - Apple Support
- Cisco Security Advisory: Multiple Vulnerabilities in ntpd (April 2015) Affecting Cisco Products
- '[security bulletin] HPSBHF03557 rev.1 - HPE Networking Products using Comware 7 (CW7) running NTP, R'
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
6- Range: <4.2.8p2
- osv-coords4 versionspkg:rpm/opensuse/ntp&distro=openSUSE%20Tumbleweedpkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012
< 4.2.8p9-1.1+ 3 more
- (no CPE)range: < 4.2.8p9-1.1
- (no CPE)range: < 4.2.6p5-44.1
- (no CPE)range: < 4.2.6p5-44.1
- (no CPE)range: < 4.2.6p5-44.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
24- support.ntp.org/bin/view/Main/SecurityNoticenvdVendor Advisory
- www.kb.cert.org/vuls/id/374268nvdThird Party AdvisoryUS Government Resource
- bugs.ntp.org/show_bug.cginvd
- listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2015/04/msg00002.htmlnvd
- lists.apple.com/archives/security-announce/2015/Jun/msg00002.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2015-April/155863.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2015-April/155864.htmlnvd
- lists.opensuse.org/opensuse-updates/2015-04/msg00052.htmlnvd
- marc.infonvd
- marc.infonvd
- rhn.redhat.com/errata/RHSA-2015-1459.htmlnvd
- support.apple.com/kb/HT204942nvd
- tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-ntpdnvd
- tools.cisco.com/security/center/viewAlert.xnvd
- www.debian.org/security/2015/dsa-3222nvd
- www.debian.org/security/2015/dsa-3223nvd
- www.mandriva.com/security/advisoriesnvd
- www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.htmlnvd
- www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.htmlnvd
- www.securityfocus.com/bid/73950nvd
- www.securitytracker.com/id/1032031nvd
- www.ubuntu.com/usn/USN-2567-1nvd
- kc.mcafee.com/corporate/indexnvd
- security.gentoo.org/glsa/201509-01nvd
News mentions
0No linked articles in our index yet.