Описание
The config_auth function in ntpd in NTP before 4.2.7p11, when an auth key is not configured, improperly generates a key, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 1:4.2.6.p5+dfsg-3ubuntu3 |
esm-infra-legacy/trusty | released | 1:4.2.6.p5+dfsg-3ubuntu2.14.04.1 |
lucid | released | 1:4.2.4p8+dfsg-1ubuntu2.2 |
precise | released | 1:4.2.6.p3+dfsg-1ubuntu3.2 |
trusty | released | 1:4.2.6.p5+dfsg-3ubuntu2.14.04.1 |
trusty/esm | released | 1:4.2.6.p5+dfsg-3ubuntu2.14.04.1 |
upstream | released | 4.2.8 |
utopic | released | 1:4.2.6.p5+dfsg-3ubuntu2.14.10.1 |
Показывать по
EPSS
7.5 High
CVSS2
Связанные уязвимости
The config_auth function in ntpd in NTP before 4.2.7p11, when an auth key is not configured, improperly generates a key, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
The config_auth function in ntpd in NTP before 4.2.7p11, when an auth key is not configured, improperly generates a key, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
The config_auth function in ntpd in NTP before 4.2.7p11, when an auth ...
The config_auth function in ntpd in NTP before 4.2.7p11, when an auth key is not configured, improperly generates a key, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
Уязвимость микропрограммного обеспечения системы коммуникаций Cisco Unified Communications Manager, позволяющая удаленному злоумышленнику обойти механизм защиты устройства
EPSS
7.5 High
CVSS2