Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-5196

Опубликовано: 23 окт. 2015
Источник: ubuntu
Приоритет: low

Описание

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2015-7703. Reason: This candidate is a reservation duplicate of CVE-2015-7703. Notes: All CVE users should reference CVE-2015-7703 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

РелизСтатусПримечание
devel

released

1:4.2.6.p5+dfsg-3ubuntu8.1
esm-infra-legacy/trusty

released

1:4.2.6.p5+dfsg-3ubuntu2.14.04.5
precise

released

1:4.2.6.p3+dfsg-1ubuntu3.6
trusty

released

1:4.2.6.p5+dfsg-3ubuntu2.14.04.5
trusty/esm

released

1:4.2.6.p5+dfsg-3ubuntu2.14.04.5
upstream

needs-triage

vivid

released

1:4.2.6.p5+dfsg-3ubuntu6.2
vivid/stable-phone-overlay

released

1:4.2.6.p5+dfsg-3ubuntu6.2
vivid/ubuntu-core

DNE

wily

released

1:4.2.6.p5+dfsg-3ubuntu8.1

Показывать по

Связанные уязвимости

redhat
почти 10 лет назад

It was found that NTP's :config command could be used to set the pidfile and driftfile paths without any restrictions. A remote attacker could use this flaw to overwrite a file on the file system with a file containing the pid of the ntpd process (immediately) or the current estimated drift of the system clock (in hourly intervals).

nvd
почти 10 лет назад

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2015-7703. Reason: This candidate is a reservation duplicate of CVE-2015-7703. Notes: All CVE users should reference CVE-2015-7703 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

oracle-oval
почти 9 лет назад

ELSA-2016-2583: ntp security and bug fix update (MODERATE)