Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-7426

Опубликовано: 13 янв. 2017
Источник: debian

Описание

NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ntpfixed1:4.2.8p9+dfsg-1package
ntpno-dsajessiepackage
ntpno-dsawheezypackage

Примечания

  • http://support.ntp.org/bin/view/Main/NtpBug3071

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 9 лет назад

NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.

CVSS3: 5.9
redhat
около 9 лет назад

NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.

CVSS3: 7.5
nvd
около 9 лет назад

NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.

CVSS3: 7.5
github
больше 3 лет назад

NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.

oracle-oval
около 9 лет назад

ELSA-2017-0252: ntp security update (MODERATE)