Описание
NTP before 4.2.8p9 allows remote attackers to bypass the origin timestamp protection mechanism via an origin timestamp of zero. NOTE: this vulnerability exists because of a CVE-2015-8138 regression.
Отчет
This issue did not affect the versions of ntp as shipped with Red Hat Enterprise Linux 5, 6 and 7.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | ntp | Not affected | ||
Red Hat Enterprise Linux 6 | ntp | Not affected | ||
Red Hat Enterprise Linux 7 | ntp | Not affected |
Показывать по
Дополнительная информация
Статус:
5.3 Medium
CVSS3
5 Medium
CVSS2
Связанные уязвимости
NTP before 4.2.8p9 allows remote attackers to bypass the origin timestamp protection mechanism via an origin timestamp of zero. NOTE: this vulnerability exists because of a CVE-2015-8138 regression.
NTP before 4.2.8p9 allows remote attackers to bypass the origin timestamp protection mechanism via an origin timestamp of zero. NOTE: this vulnerability exists because of a CVE-2015-8138 regression.
NTP before 4.2.8p9 allows remote attackers to bypass the origin timest ...
NTP before 4.2.8p9 allows remote attackers to bypass the origin timestamp protection mechanism via an origin timestamp of zero. NOTE: this vulnerability exists because of a CVE-2015-8138 regression.
5.3 Medium
CVSS3
5 Medium
CVSS2