Описание
A malicious authenticated peer can create arbitrarily-many ephemeral associations in order to win the clock selection algorithm in ntpd in NTP 4.2.8p4 and earlier and NTPsec 3e160db8dc248a0bcb053b56a80167dc742d2b74 and a5fb34b9cc89b92a8fef2f459004865c93bb7f92 and modify a victim's clock.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | ignored | |
| esm-infra-legacy/trusty | ignored | |
| esm-infra/xenial | ignored | |
| precise | ignored | |
| trusty | ignored | |
| trusty/esm | ignored | |
| upstream | released | 1:4.2.8p7+dfsg-1 |
| vivid/stable-phone-overlay | ignored | |
| vivid/ubuntu-core | DNE | |
| wily | ignored |
Показывать по
4 Medium
CVSS2
6.5 Medium
CVSS3
Связанные уязвимости
A malicious authenticated peer can create arbitrarily-many ephemeral associations in order to win the clock selection algorithm in ntpd in NTP 4.2.8p4 and earlier and NTPsec 3e160db8dc248a0bcb053b56a80167dc742d2b74 and a5fb34b9cc89b92a8fef2f459004865c93bb7f92 and modify a victim's clock.
A malicious authenticated peer can create arbitrarily-many ephemeral associations in order to win the clock selection algorithm in ntpd in NTP 4.2.8p4 and earlier and NTPsec 3e160db8dc248a0bcb053b56a80167dc742d2b74 and a5fb34b9cc89b92a8fef2f459004865c93bb7f92 and modify a victim's clock.
A malicious authenticated peer can create arbitrarily-many ephemeral a ...
A malicious authenticated peer can create arbitrarily-many ephemeral associations in order to win the clock selection algorithm in ntpd in NTP 4.2.8p4 and earlier and NTPsec 3e160db8dc248a0bcb053b56a80167dc742d2b74 and a5fb34b9cc89b92a8fef2f459004865c93bb7f92 and modify a victim's clock.
Уязвимость сетевого протокола NTP, связанная с ошибкой при обработке данных, позволяющая нарушителю оказать воздействие на целостность данных
4 Medium
CVSS2
6.5 Medium
CVSS3