Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-9310

Опубликовано: 21 нояб. 2016
Источник: redhat
CVSS3: 4.8
CVSS2: 5.8
EPSS Низкий

Описание

The control mode (mode 6) functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to set or unset traps via a crafted control mode packet.

A flaw was found in the control mode functionality of ntpd. A remote attacker could send a crafted control mode packet which could lead to information disclosure or result in DDoS amplification attacks.

Меры по смягчению последствий

Use "restrict default noquery ..." in your ntp.conf file.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5ntpWill not fix
Red Hat Enterprise Linux 6ntpFixedRHSA-2017:025206.02.2017
Red Hat Enterprise Linux 7ntpFixedRHSA-2017:025206.02.2017

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1397319ntp: Mode 6 unauthenticated trap information disclosure and DDoS vector

EPSS

Процентиль: 84%
0.02287
Низкий

4.8 Medium

CVSS3

5.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 9 лет назад

The control mode (mode 6) functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to set or unset traps via a crafted control mode packet.

CVSS3: 6.5
nvd
около 9 лет назад

The control mode (mode 6) functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to set or unset traps via a crafted control mode packet.

CVSS3: 6.5
debian
около 9 лет назад

The control mode (mode 6) functionality in ntpd in NTP before 4.2.8p9 ...

CVSS3: 6.5
github
больше 3 лет назад

The control mode (mode 6) functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to set or unset traps via a crafted control mode packet.

oracle-oval
около 9 лет назад

ELSA-2017-0252: ntp security update (MODERATE)

EPSS

Процентиль: 84%
0.02287
Низкий

4.8 Medium

CVSS3

5.8 Medium

CVSS2