Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8138

Опубликовано: 30 янв. 2017
Источник: debian

Описание

NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ntpfixed1:4.2.8p7+dfsg-1package

Примечания

  • http://www.talosintel.com/reports/TALOS-2016-0077/

  • https://github.com/ntp-project/ntp/commit/880191b72409a1965712999d248d70e6f7163af8

  • The upstream fix for this issue is reported to be incomplete:

  • http://bugs.ntp.org/show_bug.cgi?id=2945#c7

  • http://lists.ntp.org/pipermail/hackers/2016-January/007406.html

  • http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 8 лет назад

NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.

redhat
больше 9 лет назад

NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.

CVSS3: 5.3
nvd
больше 8 лет назад

NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.

CVSS3: 5.3
github
больше 3 лет назад

NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.

oracle-oval
больше 9 лет назад

ELSA-2016-0063: ntp security update (IMPORTANT)