Описание
Network Time Protocol (NTP), as specified in RFC 5905, uses port 123 even for modes where a fixed port number is not required, which makes it easier for remote attackers to conduct off-path attacks.
Network Time Protocol (NTP), as specified in RFC 5905, uses port 123 even for modes where a fixed port number is not required, which makes it easier for remote attackers to conduct off-path attacks.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2019-11331
- https://support.f5.com/csp/article/K09940637
- https://support.f5.com/csp/article/K09940637?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K09940637?utm_source=f5support&utm_medium=RSS
- https://tools.ietf.org/html/draft-gont-ntp-port-randomization-00
- http://www.securityfocus.com/bid/108010
Связанные уязвимости
Network Time Protocol (NTP), as specified in RFC 5905, uses port 123 even for modes where a fixed port number is not required, which makes it easier for remote attackers to conduct off-path attacks.
Network Time Protocol (NTP), as specified in RFC 5905, uses port 123 even for modes where a fixed port number is not required, which makes it easier for remote attackers to conduct off-path attacks.
Уязвимость протокола сетевого времени NTP, связанная с недостаточной защитой служебных данных, позволяющая нарушителю вызвать отказ в обслуживании