Описание
The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | code not built |
| esm-infra-legacy/trusty | not-affected | code not built |
| esm-infra/xenial | not-affected | code not built |
| precise | not-affected | code not built |
| trusty | not-affected | code not built |
| trusty/esm | not-affected | code not built |
| upstream | needs-triage | |
| vivid/stable-phone-overlay | not-affected | code not built |
| vivid/ubuntu-core | not-affected | code not built |
| xenial | not-affected | code not built |
Показывать по
Ссылки на источники
7.8 High
CVSS2
7.5 High
CVSS3
Связанные уязвимости
The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.
The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.
The recv_and_process_client_pkt function in networking/ntpd.c in busyb ...
The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.
7.8 High
CVSS2
7.5 High
CVSS3