Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-4954

Опубликовано: 05 июл. 2016
Источник: debian
EPSS Низкий

Описание

The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ntpfixed1:4.2.8p8+dfsg-1package
ntpno-dsajessiepackage
ntpno-dsawheezypackage

Примечания

  • http://support.ntp.org/bin/view/Main/SecurityNotice#June_2016_ntp_4_2_8p8_NTP_Securi

  • http://support.ntp.org/bin/view/Main/NtpBug3044

EPSS

Процентиль: 86%
0.02862
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 9 лет назад

The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.

redhat
больше 9 лет назад

The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.

CVSS3: 7.5
nvd
больше 9 лет назад

The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.

CVSS3: 7.5
github
больше 3 лет назад

The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.

suse-cvrf
больше 9 лет назад

Security update for ntp

EPSS

Процентиль: 86%
0.02862
Низкий