Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-6460

Опубликовано: 27 мар. 2017
Источник: debian

Описание

Stack-based buffer overflow in the reslist function in ntpq in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote servers have unspecified impact via a long flagstr variable in a restriction list response.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ntpfixed1:4.2.8p10+dfsg-1package
ntpnot-affectedjessiepackage
ntpnot-affectedwheezypackage

Примечания

  • http://support.ntp.org/bin/view/Main/NtpBug3377

  • https://cure53.de/pentest-report_ntp.pdf

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 9 лет назад

Stack-based buffer overflow in the reslist function in ntpq in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote servers have unspecified impact via a long flagstr variable in a restriction list response.

CVSS3: 7.1
redhat
почти 9 лет назад

Stack-based buffer overflow in the reslist function in ntpq in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote servers have unspecified impact via a long flagstr variable in a restriction list response.

CVSS3: 8.8
nvd
почти 9 лет назад

Stack-based buffer overflow in the reslist function in ntpq in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote servers have unspecified impact via a long flagstr variable in a restriction list response.

CVSS3: 8.8
github
больше 3 лет назад

Stack-based buffer overflow in the reslist function in ntpq in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote servers have unspecified impact via a long flagstr variable in a restriction list response.

suse-cvrf
почти 9 лет назад

Security update for ntp