Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2016-3612

Опубликовано: 09 сент. 2016
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2016-3612: ntp security update (IMPORTANT)

[4.2.6p5-22.0.1.el7_2.2]

  • add disable monitor to default ntp.conf [CVE-2013-5211]

Обновленные пакеты

Oracle Linux 7

Oracle Linux x86_64

ntp

4.2.6p5-22.0.1.el7_2.2

ntp-doc

4.2.6p5-22.0.1.el7_2.2

ntp-perl

4.2.6p5-22.0.1.el7_2.2

ntpdate

4.2.6p5-22.0.1.el7_2.2

sntp

4.2.6p5-22.0.1.el7_2.2

Связанные CVE

Связанные уязвимости

ubuntu
почти 12 лет назад

The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.

redhat
больше 15 лет назад

The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.

nvd
почти 12 лет назад

The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.

debian
почти 12 лет назад

The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 al ...

github
больше 3 лет назад

The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.