Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-11868

Опубликовано: 03 мар. 2020
Источник: redhat
CVSS3: 3.7
EPSS Низкий

Описание

ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a valid origin timestamp.

A flaw was found in the Network Time Protocol (NTP), where a security issue exists that allows an off-path attacker to prevent the Network Time Protocol daemon (ntpd) from synchronizing with NTP servers not using authentication. A server mode packet with a spoofed source address sent to the client ntpd causes the next transmission to be rescheduled, even if the packet does not have a valid origin timestamp. If the packet is sent to the client frequently enough, it stops polling the server and is unable to synchronize with it.

Меры по смягчению последствий

Use authentication with symmetric keys.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5ntpOut of support scope
Red Hat Enterprise Linux 6ntpOut of support scope
Red Hat Enterprise Linux 7ntpFixedRHSA-2020:266323.06.2020

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1716665ntp: DoS on client ntpd using server mode packet

EPSS

Процентиль: 68%
0.00597
Низкий

3.7 Low

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 5 лет назад

ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a valid origin timestamp.

CVSS3: 7.5
nvd
около 5 лет назад

ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a valid origin timestamp.

CVSS3: 7.5
debian
около 5 лет назад

ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-pat ...

CVSS3: 7.5
github
около 3 лет назад

ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a valid origin timestamp.

CVSS3: 7.5
fstec
около 5 лет назад

Уязвимость демона ntpd реализации протокола синхронизации времени NTP, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 68%
0.00597
Низкий

3.7 Low

CVSS3