Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-7184

Опубликовано: 06 мар. 2018
Источник: debian
EPSS Средний

Описание

ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ntpfixed1:4.2.8p11+dfsg-1package
ntpno-dsastretchpackage
ntpno-dsajessiepackage
ntpignoredwheezypackage
ntpsecnot-affectedpackage

Примечания

  • http://www.kb.cert.org/vuls/id/961909

  • http://support.ntp.org/bin/view/Main/NtpBug3453

  • http://support.ntp.org/bin/view/Main/SecurityNotice#February_2018_ntp_4_2_8p11_NTP_S

  • http://bk.ntp.org/ntp-stable/?PAGE=cset&REV=5a76f46bK1M87GD1tJounOczC-5Zow

EPSS

Процентиль: 94%
0.13128
Средний

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 8 лет назад

ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.

CVSS3: 3.1
redhat
почти 8 лет назад

ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.

CVSS3: 7.5
nvd
почти 8 лет назад

ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.

CVSS3: 7.5
github
больше 3 лет назад

ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.

CVSS3: 5.3
fstec
почти 8 лет назад

Уязвимость программы-демона ntpd реализации протокола синхронизации времени NTP, связанная с ошибками обработки входных данных, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 94%
0.13128
Средний