Количество 11
Количество 11
GHSA-fp4r-m88r-wmm8
An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer->dst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.

CVE-2016-1548
An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer->dst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.

CVE-2016-1548
An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer->dst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.

CVE-2016-1548
An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer->dst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.
CVE-2016-1548
An attacker can spoof a packet from a legitimate ntpd server with an o ...
ELSA-2016-1141
ELSA-2016-1141: ntp security update (MODERATE)

openSUSE-SU-2016:1329-1
Security update for ntp

SUSE-SU-2016:1471-1
Security update for ntp

SUSE-SU-2016:1291-1
Security update for ntp

SUSE-SU-2016:1278-1
Security update for ntp

SUSE-SU-2016:1568-1
Security update for ntp
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-fp4r-m88r-wmm8 An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer->dst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched. | CVSS3: 7.2 | 2% Низкий | больше 3 лет назад | |
![]() | CVE-2016-1548 An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer->dst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched. | CVSS3: 7.2 | 2% Низкий | больше 8 лет назад |
![]() | CVE-2016-1548 An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer->dst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched. | CVSS2: 6.4 | 2% Низкий | больше 9 лет назад |
![]() | CVE-2016-1548 An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer->dst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched. | CVSS3: 7.2 | 2% Низкий | больше 8 лет назад |
CVE-2016-1548 An attacker can spoof a packet from a legitimate ntpd server with an o ... | CVSS3: 7.2 | 2% Низкий | больше 8 лет назад | |
ELSA-2016-1141 ELSA-2016-1141: ntp security update (MODERATE) | около 9 лет назад | |||
![]() | openSUSE-SU-2016:1329-1 Security update for ntp | больше 9 лет назад | ||
![]() | SUSE-SU-2016:1471-1 Security update for ntp | около 9 лет назад | ||
![]() | SUSE-SU-2016:1291-1 Security update for ntp | больше 9 лет назад | ||
![]() | SUSE-SU-2016:1278-1 Security update for ntp | больше 9 лет назад | ||
![]() | SUSE-SU-2016:1568-1 Security update for ntp | около 9 лет назад |
Уязвимостей на страницу