Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-7184

Опубликовано: 27 фев. 2018
Источник: redhat
CVSS3: 3.1

Описание

ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5ntpNot affected
Red Hat Enterprise Linux 6ntpNot affected
Red Hat Enterprise Linux 7ntpNot affected
Red Hat Enterprise Linux 8ntpFix deferred

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=1550218ntp: Interleaved symmetric mode cannot recover from bad state

3.1 Low

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 8 лет назад

ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.

CVSS3: 7.5
nvd
почти 8 лет назад

ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.

CVSS3: 7.5
debian
почти 8 лет назад

ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating ...

CVSS3: 7.5
github
больше 3 лет назад

ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.

CVSS3: 5.3
fstec
почти 8 лет назад

Уязвимость программы-демона ntpd реализации протокола синхронизации времени NTP, связанная с ошибками обработки входных данных, позволяющая нарушителю вызвать отказ в обслуживании

3.1 Low

CVSS3