Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-9311

Опубликовано: 21 нояб. 2016
Источник: redhat
CVSS3: 5.9
CVSS2: 4.3
EPSS Средний

Описание

ntpd in NTP before 4.2.8p9, when the trap service is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted packet.

A flaw was found in the way ntpd implemented the trap service. A remote attacker could send a specially crafted packet to cause a null pointer dereference that will crash ntpd, resulting in a denial of service.

Меры по смягчению последствий

Use "restrict default noquery ..." in your ntp.conf file. Only allow mode 6 queries from trusted networks and hosts.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5ntpWill not fix
Red Hat Enterprise Linux 6ntpFixedRHSA-2017:025206.02.2017
Red Hat Enterprise Linux 7ntpFixedRHSA-2017:025206.02.2017

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-476
https://bugzilla.redhat.com/show_bug.cgi?id=1398350ntp: Null pointer dereference when trap service is enabled

EPSS

Процентиль: 95%
0.18259
Средний

5.9 Medium

CVSS3

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.9
ubuntu
почти 9 лет назад

ntpd in NTP before 4.2.8p9, when the trap service is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted packet.

CVSS3: 5.9
nvd
почти 9 лет назад

ntpd in NTP before 4.2.8p9, when the trap service is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted packet.

CVSS3: 5.9
debian
почти 9 лет назад

ntpd in NTP before 4.2.8p9, when the trap service is enabled, allows r ...

CVSS3: 5.9
github
больше 3 лет назад

ntpd in NTP before 4.2.8p9, when the trap service is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted packet.

oracle-oval
почти 9 лет назад

ELSA-2017-0252: ntp security update (MODERATE)

EPSS

Процентиль: 95%
0.18259
Средний

5.9 Medium

CVSS3

4.3 Medium

CVSS2

Уязвимость CVE-2016-9311