Описание
The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 1:4.2.8p8+dfsg-1ubuntu2 |
| esm-infra-legacy/trusty | released | 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
| esm-infra/xenial | released | 1:4.2.8p4+dfsg-3ubuntu5.3 |
| precise | released | 1:4.2.6.p3+dfsg-1ubuntu3.11 |
| precise/esm | not-affected | 1:4.2.6.p3+dfsg-1ubuntu3.11 |
| trusty | released | 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
| trusty/esm | released | 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
| upstream | needs-triage | |
| vivid/stable-phone-overlay | ignored | end of life |
| vivid/ubuntu-core | DNE |
Показывать по
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.
The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.
The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4 ...
The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.
5 Medium
CVSS2
7.5 High
CVSS3