BSA-2017-220
21505
31 March 2017
31 March 2017
Closed
Low
3.0
N/A
CVE-2016-7427
Summary
Security Advisory ID : BSA-2017-220
Component : ntp
Revision : 1.0: Interim
The broadcast mode of NTP is expected to only be used in a trusted network. If the broadcast network is accessible to an attacker, a potentially exploitable denial of service vulnerability in ntpd's broadcast mode replay prevention functionality can be abused. An attacker with access to the NTP broadcast domain can periodically inject specially crafted broadcast mode NTP packets into the broadcast domain which, while being logged by, can cause to reject broadcast mode packets from legitimate NTP broadcast servers.
Affected Products
Product | Current Assessment |
---|---|
Brocade 5400 vRouter | Impacted: Fixed in 6.7R12. |
Brocade 5600 vRouter | Impacted: Fixed in 5.2R1. |
Products Confirmed Not Vulnerable
Brocade Fabric OS, Brocade FastIron OS, Brocade NetIron OS, Brocade Network Advisor, Brocade Network OS, Brocade SDN Controller, Brocade ServerIron ADX, Brocade Services Director, Brocade SLX-OS, Brocade Virtual ADX, Brocade Virtual Traffic Manager: Software, and Brocade Virtual Web Application Firewall are confirmed not affected by this vulnerability.
Workaround
There are no workarounds that address this vulnerability.
Revision History
Version | Change | Date |
---|---|---|
1.0 | Initial Publication | March 31, 2017 |