Описание
The control mode (mode 6) functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to set or unset traps via a crafted control mode packet.
A flaw was found in the control mode functionality of ntpd. A remote attacker could send a crafted control mode packet which could lead to information disclosure or result in DDoS amplification attacks.
Меры по смягчению последствий
Use "restrict default noquery ..." in your ntp.conf file.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | ntp | Will not fix | ||
| Red Hat Enterprise Linux 6 | ntp | Fixed | RHSA-2017:0252 | 06.02.2017 |
| Red Hat Enterprise Linux 7 | ntp | Fixed | RHSA-2017:0252 | 06.02.2017 |
Показывать по
Дополнительная информация
Статус:
EPSS
4.8 Medium
CVSS3
5.8 Medium
CVSS2
Связанные уязвимости
The control mode (mode 6) functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to set or unset traps via a crafted control mode packet.
The control mode (mode 6) functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to set or unset traps via a crafted control mode packet.
The control mode (mode 6) functionality in ntpd in NTP before 4.2.8p9 ...
The control mode (mode 6) functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to set or unset traps via a crafted control mode packet.
EPSS
4.8 Medium
CVSS3
5.8 Medium
CVSS2