Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-5211

Опубликовано: 02 янв. 2014
Источник: ubuntu
Приоритет: low
EPSS Критический
CVSS2: 5

Описание

The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.

РелизСтатусПримечание
devel

ignored

lucid

ignored

precise

ignored

quantal

ignored

raring

ignored

saucy

ignored

upstream

needs-triage

Показывать по

EPSS

Процентиль: 100%
0.9173
Критический

5 Medium

CVSS2

Связанные уязвимости

redhat
больше 15 лет назад

The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.

nvd
почти 12 лет назад

The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.

debian
почти 12 лет назад

The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 al ...

github
больше 3 лет назад

The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.

oracle-oval
около 9 лет назад

ELSA-2016-3613: ntp security update (IMPORTANT)

EPSS

Процентиль: 100%
0.9173
Критический

5 Medium

CVSS2