Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-26555

Опубликовано: 11 апр. 2023
Источник: debian
EPSS Низкий

Описание

praecis_parse in ntpd/refclock_palisade.c in NTP 4.2.8p15 has an out-of-bounds write. Any attack method would be complex, e.g., with a manipulated GPS receiver.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ntpremovedpackage
ntpno-dsabullseyepackage
ntpno-dsabusterpackage

Примечания

  • https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26555

  • https://www.ntp.org/support/securitynotice/ntpbug3807/

EPSS

Процентиль: 69%
0.00595
Низкий

Связанные уязвимости

CVSS3: 6.4
ubuntu
почти 3 года назад

praecis_parse in ntpd/refclock_palisade.c in NTP 4.2.8p15 has an out-of-bounds write. Any attack method would be complex, e.g., with a manipulated GPS receiver.

CVSS3: 5.1
redhat
почти 3 года назад

praecis_parse in ntpd/refclock_palisade.c in NTP 4.2.8p15 has an out-of-bounds write. Any attack method would be complex, e.g., with a manipulated GPS receiver.

CVSS3: 6.4
nvd
почти 3 года назад

praecis_parse in ntpd/refclock_palisade.c in NTP 4.2.8p15 has an out-of-bounds write. Any attack method would be complex, e.g., with a manipulated GPS receiver.

suse-cvrf
больше 2 лет назад

Security update for ntp

suse-cvrf
больше 2 лет назад

Security update for ntp

EPSS

Процентиль: 69%
0.00595
Низкий
Уязвимость CVE-2023-26555