Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-6460

Опубликовано: 27 мар. 2017
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 6.5
CVSS3: 8.8

Описание

Stack-based buffer overflow in the reslist function in ntpq in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote servers have unspecified impact via a long flagstr variable in a restriction list response.

РелизСтатусПримечание
devel

not-affected

1:4.2.8p10+dfsg-5ubuntu1
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/xenial

released

1:4.2.8p4+dfsg-3ubuntu5.5
precise

ignored

end of life
precise/esm

not-affected

code not present
trusty

not-affected

code not present
trusty/esm

not-affected

code not present
upstream

needs-triage

vivid/stable-phone-overlay

ignored

end of life
vivid/ubuntu-core

DNE

Показывать по

EPSS

Процентиль: 75%
0.00895
Низкий

6.5 Medium

CVSS2

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.1
redhat
почти 9 лет назад

Stack-based buffer overflow in the reslist function in ntpq in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote servers have unspecified impact via a long flagstr variable in a restriction list response.

CVSS3: 8.8
nvd
почти 9 лет назад

Stack-based buffer overflow in the reslist function in ntpq in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote servers have unspecified impact via a long flagstr variable in a restriction list response.

CVSS3: 8.8
debian
почти 9 лет назад

Stack-based buffer overflow in the reslist function in ntpq in NTP bef ...

CVSS3: 8.8
github
больше 3 лет назад

Stack-based buffer overflow in the reslist function in ntpq in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote servers have unspecified impact via a long flagstr variable in a restriction list response.

suse-cvrf
почти 9 лет назад

Security update for ntp

EPSS

Процентиль: 75%
0.00895
Низкий

6.5 Medium

CVSS2

8.8 High

CVSS3