On Wed, Dec 24, 2014 at 01:30:15PM +0200, Ivan Ivanov wrote: > > On Tue, Dec 23, 2014 at 5:01 PM, Jean Benoit <j...@unistra.fr> wrote: > > Does anyone know if Juniper has issued a patched version > > of JunOS for the following vulnerabilities in ntpd ? > > Check this out! > https://prsearch.juniper.net/InfoCenter/index?page=prcontent&id=PR931184
Though the PR was updated recently, the vulnerability description does not match the issue I am worrying about. The description refers to the 1 year old NTP amplification attack based on the ntp monlist command (CVE-2013-5211). CVE-2014-9295 is a completely unrelated issue. Of course, the same mitigation technique could be applied (filtering the source address). By the way, Cisco acknowledged the vulnerability exists, but hasn't issued any fix as of december 29: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141222-ntpd -- Jean Benoit Université de Strasbourg _______________________________________________ juniper-nsp mailing list juniper-nsp@puck.nether.net https://puck.nether.net/mailman/listinfo/juniper-nsp