Tomas Hoger 2014-02-11 10:15:59 EST
The ntp packages as shipped with Red Hat Enterprise Linux are not affected by this issue in their default configuration. The configuration defines the following default restrictions:
restrict default kod nomodify notrap nopeer noquery
restrict -6 default kod nomodify notrap nopeer noquery
These restrictions include 'noquery', which causes NTP daemon control command queries, including 'monlist' specifically pointed out by this CVE, to be rejected. The query access is only allowed from localhost in the default configuration.
Users are discouraged from allowing query by default, query access can be granted to specific hosts if needed (using 'restrict' access control command). Alternatively, users can disable monitor functionality using 'disable monitor' command in the /etc/ntp.conf. Note that use of 'restrict' command with 'limited' flag also enables monitor functionality even when 'disable monitor' command is used.
Upstream fix implemented in version 4.2.7p26 is removal of support for 'monlist' ntpdc command, and introduction of replacement 'mrulist' ntpq command, for which additional verification is done to avoid request packet source address spoofing, and to limit the size of responses. Note that version 4.2.7 is still the development version upstream. The latest production release is 4.2.6 that does not include the above fix.
Additionally, the fix in 4.2.7p26 only addresses the 'monlist' command, which has the highest amplification ratio. Other ntpdc (NTP mode 7) and ntpq (NTP mode 6) commands may be used in the future for amplification attacks with lower amplification ratio. Users who do not disable these queries are encouraged to review their configuration and enable restrictions to reduce the risk of future attacks using other commands.
Red Hat currently does not plan to modify ntp packages in released versions of Red Hat Enterprise Linux to remove monlist support. Future updates may change the default configuration to use 'disable monitor' in addition to 'restrict default noquery'.
For additional information on various ntp configuration commands, refer to the following manual pages: ntp_acc(5), ntp_misc(5), ntpdc(8) and ntpq(8).