Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-7855

Опубликовано: 21 окт. 2015
Источник: redhat
CVSS2: 3.5
EPSS Средний

Описание

The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value.

Отчет

This issue did not affect the versions of ntp as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they do not include support for the mrulist feature, which exposes the decodenetnum() function.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5ntpNot affected
Red Hat Enterprise Linux 6ntpNot affected
Red Hat Enterprise Linux 7ntpNot affected

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=1274264ntp: ASSERT in decodenetnum() on invalid values

EPSS

Процентиль: 98%
0.60116
Средний

3.5 Low

CVSS2

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 8 лет назад

The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value.

CVSS3: 6.5
nvd
больше 8 лет назад

The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value.

CVSS3: 6.5
debian
больше 8 лет назад

The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3 ...

CVSS3: 6.5
github
больше 3 лет назад

The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value.

suse-cvrf
около 10 лет назад

Security update for ntp

EPSS

Процентиль: 98%
0.60116
Средний

3.5 Low

CVSS2