Описание
ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | released | 1:4.2.8p10+dfsg-5ubuntu3.3 |
| bionic | released | 1:4.2.8p10+dfsg-5ubuntu7.1 |
| devel | released | 1:4.2.8p11+dfsg-1ubuntu1 |
| esm-apps/bionic | released | 1:4.2.8p10+dfsg-5ubuntu7.1 |
| esm-infra-legacy/trusty | not-affected | 1:4.2.6.p5+dfsg-3ubuntu2.14.04.12 |
| esm-infra/xenial | not-affected | 1:4.2.8p4+dfsg-3ubuntu5.8 |
| precise/esm | not-affected | |
| trusty | not-affected | 1:4.2.6.p5+dfsg-3ubuntu2.14.04.12 |
| trusty/esm | not-affected | 1:4.2.6.p5+dfsg-3ubuntu2.14.04.12 |
| upstream | released | 4.2.8p11 |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.
ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.
ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating ...
ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.
Уязвимость программы-демона ntpd реализации протокола синхронизации времени NTP, связанная с ошибками обработки входных данных, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
5 Medium
CVSS2
7.5 High
CVSS3