Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-6452

Опубликовано: 27 мар. 2017
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.6
CVSS3: 7.8

Описание

Stack-based buffer overflow in the Windows installer for NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via an application path on the command line.

РелизСтатусПримечание
devel

not-affected

esm-infra-legacy/trusty

not-affected

esm-infra/xenial

not-affected

precise

not-affected

trusty

not-affected

trusty/esm

not-affected

upstream

needs-triage

vivid/stable-phone-overlay

not-affected

vivid/ubuntu-core

DNE

xenial

not-affected

Показывать по

EPSS

Процентиль: 34%
0.00136
Низкий

4.6 Medium

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 1.8
redhat
почти 9 лет назад

Stack-based buffer overflow in the Windows installer for NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via an application path on the command line.

CVSS3: 7.8
nvd
почти 9 лет назад

Stack-based buffer overflow in the Windows installer for NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via an application path on the command line.

CVSS3: 7.8
debian
почти 9 лет назад

Stack-based buffer overflow in the Windows installer for NTP before 4. ...

CVSS3: 7.8
github
больше 3 лет назад

Stack-based buffer overflow in the Windows installer for NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via an application path on the command line.

EPSS

Процентиль: 34%
0.00136
Низкий

4.6 Medium

CVSS2

7.8 High

CVSS3