Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-9298

Опубликовано: 06 окт. 2015
Источник: ubuntu
Приоритет: medium

Описание

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage

РелизСтатусПримечание
devel

released

4.2.6.p5+dfsg-3ubuntu4
esm-infra-legacy/trusty

released

1:4.2.6.p5+dfsg-3ubuntu2.14.04.2
lucid

released

1:4.2.4p8+dfsg-1ubuntu2.3
precise

released

1:4.2.6.p3+dfsg-1ubuntu3.3
trusty

released

1:4.2.6.p5+dfsg-3ubuntu2.14.04.2
trusty/esm

released

1:4.2.6.p5+dfsg-3ubuntu2.14.04.2
upstream

released

1:4.2.6.p5+dfsg-4
utopic

released

1:4.2.6.p5+dfsg-3ubuntu2.14.10.2

Показывать по

Связанные уязвимости

redhat
почти 11 лет назад

It was found that because NTP's access control was based on a source IP address, an attacker could bypass source IP restrictions and send malicious control and configuration packets by spoofing ::1 addresses.

nvd
около 10 лет назад

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage

suse-cvrf
почти 11 лет назад

Security update for ntp

suse-cvrf
почти 13 лет назад

Recommended update for ntp

oracle-oval
больше 10 лет назад

ELSA-2015-1459: ntp security, bug fix, and enhancement update (MODERATE)