Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-7854

Опубликовано: 07 авг. 2017
Источник: debian
EPSS Низкий

Описание

Buffer overflow in the password management functionality in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ntpfixed1:4.2.8p4+dfsg-1package
ntpnot-affectedjessiepackage
ntpnot-affectedwheezypackage
ntpnot-affectedsqueezepackage

Примечания

  • http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_Security_Vulner

  • https://github.com/ntp-project/ntp/commit/1bb401576f412532d8cdcca5509b85ad29605913

EPSS

Процентиль: 88%
0.038
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 8 лет назад

Buffer overflow in the password management functionality in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.

redhat
больше 10 лет назад

Buffer overflow in the password management functionality in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.

CVSS3: 8.8
nvd
больше 8 лет назад

Buffer overflow in the password management functionality in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.

CVSS3: 8.8
github
больше 3 лет назад

Buffer overflow in the password management functionality in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.

suse-cvrf
около 10 лет назад

Security update for ntp

EPSS

Процентиль: 88%
0.038
Низкий