Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9prp-4cr8-gqhf

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets.

The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets.

EPSS

Процентиль: 95%
0.20108
Средний

Связанные уязвимости

ubuntu
больше 10 лет назад

The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets.

redhat
больше 10 лет назад

The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets.

nvd
больше 10 лет назад

The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets.

debian
больше 10 лет назад

The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 contin ...

fstec
больше 10 лет назад

Уязвимость микропрограммного обеспечения системы коммуникаций Cisco Unified Communications Manager, позволяющая удаленному злоумышленнику получить несанкционированный доступ к устройству

EPSS

Процентиль: 95%
0.20108
Средний