Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-7854

Опубликовано: 21 окт. 2015
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

Buffer overflow in the password management functionality in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.

Отчет

This issue did not affect the versions of ntp as shipped with Red Hat Enterprise Linux 5, 6, and 7.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5ntpNot affected
Red Hat Enterprise Linux 6ntpNot affected
Red Hat Enterprise Linux 7ntpNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=1274263ntp: password length memory corruption vulnerability

EPSS

Процентиль: 88%
0.038
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 8 лет назад

Buffer overflow in the password management functionality in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.

CVSS3: 8.8
nvd
больше 8 лет назад

Buffer overflow in the password management functionality in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.

CVSS3: 8.8
debian
больше 8 лет назад

Buffer overflow in the password management functionality in NTP 4.2.x ...

CVSS3: 8.8
github
больше 3 лет назад

Buffer overflow in the password management functionality in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.

suse-cvrf
около 10 лет назад

Security update for ntp

EPSS

Процентиль: 88%
0.038
Низкий

4.3 Medium

CVSS2