Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-5219

Опубликовано: 21 июл. 2017
Источник: debian
EPSS Низкий

Описание

The ULOGTOD function in ntp.d in SNTP before 4.2.7p366 does not properly perform type conversions from a precision value to a double, which allows remote attackers to cause a denial of service (infinite loop) via a crafted NTP packet.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ntpfixed1:4.2.8p3+dfsg-1package
ntpno-dsajessiepackage
ntpno-dsawheezypackage
ntpno-dsasqueezepackage

Примечания

  • https://github.com/ntp-project/ntp/commit/5f295cd05c3c136d39f5b3e500a2d781bdbb59c8

EPSS

Процентиль: 87%
0.0364
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 8 лет назад

The ULOGTOD function in ntp.d in SNTP before 4.2.7p366 does not properly perform type conversions from a precision value to a double, which allows remote attackers to cause a denial of service (infinite loop) via a crafted NTP packet.

redhat
почти 10 лет назад

The ULOGTOD function in ntp.d in SNTP before 4.2.7p366 does not properly perform type conversions from a precision value to a double, which allows remote attackers to cause a denial of service (infinite loop) via a crafted NTP packet.

CVSS3: 7.5
nvd
около 8 лет назад

The ULOGTOD function in ntp.d in SNTP before 4.2.7p366 does not properly perform type conversions from a precision value to a double, which allows remote attackers to cause a denial of service (infinite loop) via a crafted NTP packet.

CVSS3: 7.5
github
больше 3 лет назад

The ULOGTOD function in ntp.d in SNTP before 4.2.7p366 does not properly perform type conversions from a precision value to a double, which allows remote attackers to cause a denial of service (infinite loop) via a crafted NTP packet.

suse-cvrf
больше 8 лет назад

Security update for ntp

EPSS

Процентиль: 87%
0.0364
Низкий