Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-7185

Опубликовано: 06 мар. 2018
Источник: debian
EPSS Низкий

Описание

The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ntpfixed1:4.2.8p11+dfsg-1package
ntpno-dsastretchpackage
ntpno-dsajessiepackage
ntpignoredwheezypackage
ntpsecnot-affectedpackage

Примечания

  • http://www.kb.cert.org/vuls/id/961909

  • http://support.ntp.org/bin/view/Main/NtpBug3454

  • http://support.ntp.org/bin/view/Main/SecurityNotice#February_2018_ntp_4_2_8p11_NTP_S

EPSS

Процентиль: 86%
0.0292
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 8 лет назад

The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association.

CVSS3: 3.1
redhat
почти 8 лет назад

The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association.

CVSS3: 7.5
nvd
почти 8 лет назад

The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association.

CVSS3: 7.5
github
больше 3 лет назад

The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association.

CVSS3: 5.3
fstec
почти 8 лет назад

Уязвимость реализации протокола синхронизации времени NTP, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 86%
0.0292
Низкий