Описание
ELSA-2016-3613: ntp security update (IMPORTANT)
[4.2.6p5-10.0.1.el6_8.1]
- add disable monitor to default ntp.conf [CVE-2013-5211]
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
ntp
4.2.6p5-10.0.1.el6.1
ntp-doc
4.2.6p5-10.0.1.el6.1
ntp-perl
4.2.6p5-10.0.1.el6.1
ntpdate
4.2.6p5-10.0.1.el6.1
Oracle Linux i686
ntp
4.2.6p5-10.0.1.el6.1
ntp-doc
4.2.6p5-10.0.1.el6.1
ntp-perl
4.2.6p5-10.0.1.el6.1
ntpdate
4.2.6p5-10.0.1.el6.1
Oracle Linux sparc64
ntp
4.2.6p5-10.0.1.el6.1
ntpdate
4.2.6p5-10.0.1.el6.1
Связанные CVE
Связанные уязвимости
The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.
The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.
The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.
The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 al ...
The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.