Описание
The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 1:4.2.6.p5+dfsg-3ubuntu8.1 |
| esm-infra-legacy/trusty | released | 1:4.2.6.p5+dfsg-3ubuntu2.14.04.5 |
| precise | released | 1:4.2.6.p3+dfsg-1ubuntu3.6 |
| trusty | released | 1:4.2.6.p5+dfsg-3ubuntu2.14.04.5 |
| trusty/esm | released | 1:4.2.6.p5+dfsg-3ubuntu2.14.04.5 |
| upstream | needs-triage | |
| vivid | released | 1:4.2.6.p5+dfsg-3ubuntu6.2 |
| vivid/stable-phone-overlay | released | 1:4.2.6.p5+dfsg-3ubuntu6.2 |
| vivid/ubuntu-core | DNE | |
| wily | released | 1:4.2.6.p5+dfsg-3ubuntu8.1 |
Показывать по
Ссылки на источники
EPSS
7.5 High
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.
The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.
The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8 ...
The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.
Уязвимость параметра datalen драйвера refclock протокола сетевого времени NTP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
EPSS
7.5 High
CVSS2
9.8 Critical
CVSS3