Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-6458

Опубликовано: 27 мар. 2017
Источник: debian

Описание

Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ntpfixed1:4.2.8p10+dfsg-1package

Примечания

  • http://support.ntp.org/bin/view/Main/NtpBug3379

  • https://cure53.de/pentest-report_ntp.pdf

  • This is not a vulnerability per se, but a weakness in an internal helper function

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 9 лет назад

Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.

CVSS3: 7.1
redhat
почти 9 лет назад

Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.

CVSS3: 8.8
nvd
почти 9 лет назад

Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.

CVSS3: 8.8
github
больше 3 лет назад

Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.

suse-cvrf
почти 9 лет назад

Security update for ntp