Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-6452

Опубликовано: 21 мар. 2017
Источник: redhat
CVSS3: 1.8
EPSS Низкий

Описание

Stack-based buffer overflow in the Windows installer for NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via an application path on the command line.

Отчет

This issue did not affect the versions of ntp as shipped with Red Hat Enterprise Linux.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5ntpNot affected
Red Hat Enterprise Linux 6ntpNot affected
Red Hat Enterprise Linux 7ntpNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=1435564ntp: Stack Buffer Overflow from Command Line

EPSS

Процентиль: 34%
0.00136
Низкий

1.8 Low

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 9 лет назад

Stack-based buffer overflow in the Windows installer for NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via an application path on the command line.

CVSS3: 7.8
nvd
почти 9 лет назад

Stack-based buffer overflow in the Windows installer for NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via an application path on the command line.

CVSS3: 7.8
debian
почти 9 лет назад

Stack-based buffer overflow in the Windows installer for NTP before 4. ...

CVSS3: 7.8
github
больше 3 лет назад

Stack-based buffer overflow in the Windows installer for NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via an application path on the command line.

EPSS

Процентиль: 34%
0.00136
Низкий

1.8 Low

CVSS3