Описание
The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.
The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2015-7853
- https://bto.bluecoat.com/security-advisory/sa103
- https://bugzilla.redhat.com/show_bug.cgi?id=1274262
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- https://security.gentoo.org/glsa/201607-15
- https://security.netapp.com/advisory/ntap-20171004-0001
- https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html
- http://packetstormsecurity.com/files/134082/FreeBSD-Security-Advisory-ntp-Authentication-Bypass.html
- http://packetstormsecurity.com/files/134137/Slackware-Security-Advisory-ntp-Updates.html
- http://support.ntp.org/bin/view/Main/NtpBug2920
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-ntp
- http://www.securityfocus.com/archive/1/536737/100/0/threaded
- http://www.securityfocus.com/archive/1/536760/100/0/threaded
- http://www.securityfocus.com/archive/1/536796/100/0/threaded
- http://www.securityfocus.com/archive/1/536833/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/536737/100/100/threaded
- http://www.securityfocus.com/archive/1/archive/1/536760/100/100/threaded
- http://www.securityfocus.com/archive/1/archive/1/536796/100/100/threaded
- http://www.securityfocus.com/archive/1/archive/1/536833/100/100/threaded
- http://www.securityfocus.com/bid/77273
- http://www.securitytracker.com/id/1033951
- http://www.talosintel.com/vulnerability-reports
- http://www.ubuntu.com/usn/USN-2783-1
Связанные уязвимости
The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.
The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.
The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.
The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8 ...
Уязвимость параметра datalen драйвера refclock протокола сетевого времени NTP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании