DbAppWeb.com

Menu
  • Home
  • Linux
  • HP-UX
  • macOS
  • Windows
  • Web Servers
  • App Servers
  • Storage

Network Time Protocol Daemon (ntpd) monlist Command Enabled DoS

July 13, 2021 DbAppWeb Admin

NESSUS tool found below vulnerability on the scan of a Linux NTP server.

71783 – Network Time Protocol Daemon (ntpd) monlist Command Enabled DoS

 

Synopsis

The remote NTP server is affected by a denial of service vulnerability.

 

Description

The version of ntpd running on the remote host has the ‘monlist’ command enabled. This command returns a list of recent hosts that have connected to the service. However, it is affected by a denial of service vulnerability in ntp_request.c that allows an unauthenticated, remote attacker to saturate network traffic to a specific IP address by using forged REQ_MON_GETLIST or REQ_MON_GETLIST_1 requests.
Furthermore, an attacker can exploit this issue to conduct reconnaissance or distributed denial of service (DDoS) attacks.

Solution

If using NTP from the Network Time Protocol Project, upgrade to NTP version 4.2.7-p26 or later. Alternatively, add ‘disable monitor’ to the ntp.conf configuration file and restart the service. Otherwise, limit access to the affected service to trusted hosts, or contact the vendor for a fix

Follow the steps given below to remove the above vulnerability from an NTP server:

  • Check the version of the NTP server using the below command.
    # ntpd !
    ntpd 4.2.6p5
    ntpd 4.2.6p5@1.2349-o Tue Jan 26 13:50:52 UTC 2016 (1)
  • As the above output shows that the NTP server version is less than 4.2.7-p26 so I have to update the NTP server or add disable monitor. Here I am not upgrading the NTP server so I have added disable monitor. To do this on an NTP server, edit the /etc/ntp.conf file and add the below line of code as shown below:
    # vi /etc/ntp.conf
    
    .
    .
    disable monitor
    .
    .
  • Save the file and restart the NTP service using the below command.
    # service ntpd restart
    Shutting down ntpd:                                        [  OK  ]
    Starting ntpd:                                             [  OK  ]
  • Now, above said vulnerability has been removed from your server. You may verify it by running the NESSUS tool once again.
Last Updated: July 13, 2021

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Telegram (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)
Prev Article
Next Article
Tags:Linux NTP Server RHEL Sys Admin System Security

Leave a Reply Cancel Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Popular
  • Recent

Categories

  • Android (2)
  • Blogger (16)
  • Domain and Hosting (1)
  • Hardware Issues (7)
  • HP-UX (55)
  • HPE Data Protector (9)
  • IBM Lotus Notes (2)
  • IBM WebSphere Application Server (16)
  • Internet Tips & Tricks (15)
  • iOS (8)
  • JBoss/WildFly Application Server (2)
  • Linux (76)
  • macOS (15)
  • Microsoft Windows (31)
  • News and Updates (11)
  • Oracle Database (5)
  • SSL/TLS (1)
  • Storage Servers (23)
  • Tools/Softwares (1)
  • VMware ESXi (17)
  • Web Servers (14)
  • WordPress (5)

Archives

DbAppWeb.com

Solution of Database, Application and Web Server Problems

About DbAppWeb.com

One Stop Solution for Database Server, Application Server and Web Server Problems.

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

DbAppWeb on Social Media

Copyright © 2026 DbAppWeb.com
Terms and Conditions   Theme by MyThemeShop.com