Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-6301

Опубликовано: 09 дек. 2016
Источник: ubuntu
Приоритет: low
CVSS2: 7.8
CVSS3: 7.5

Описание

The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.

РелизСтатусПримечание
devel

not-affected

code not built
esm-infra-legacy/trusty

not-affected

code not built
esm-infra/xenial

not-affected

code not built
precise

not-affected

code not built
trusty

not-affected

code not built
trusty/esm

not-affected

code not built
upstream

needs-triage

vivid/stable-phone-overlay

not-affected

code not built
vivid/ubuntu-core

not-affected

code not built
xenial

not-affected

code not built

Показывать по

Ссылки на источники

7.8 High

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
больше 9 лет назад

The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.

CVSS3: 7.5
nvd
около 9 лет назад

The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.

CVSS3: 7.5
debian
около 9 лет назад

The recv_and_process_client_pkt function in networking/ntpd.c in busyb ...

CVSS3: 7.5
github
больше 3 лет назад

The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.

suse-cvrf
около 4 лет назад

Security update for busybox

7.8 High

CVSS2

7.5 High

CVSS3