Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-6452

Опубликовано: 27 мар. 2017
Источник: debian
EPSS Низкий

Описание

Stack-based buffer overflow in the Windows installer for NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via an application path on the command line.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ntpnot-affectedpackage

Примечания

  • http://support.ntp.org/bin/view/Main/NtpBug3383

EPSS

Процентиль: 34%
0.00136
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 9 лет назад

Stack-based buffer overflow in the Windows installer for NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via an application path on the command line.

CVSS3: 1.8
redhat
почти 9 лет назад

Stack-based buffer overflow in the Windows installer for NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via an application path on the command line.

CVSS3: 7.8
nvd
почти 9 лет назад

Stack-based buffer overflow in the Windows installer for NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via an application path on the command line.

CVSS3: 7.8
github
больше 3 лет назад

Stack-based buffer overflow in the Windows installer for NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via an application path on the command line.

EPSS

Процентиль: 34%
0.00136
Низкий