Логотип exploitDog
bind:CVE-2014-9751
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2014-9751

Количество 6

Количество 6

ubuntu логотип

CVE-2014-9751

около 10 лет назад

The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before 4.2.8p1 on Linux and OS X does not properly determine whether a source IP address is an IPv6 loopback address, which makes it easier for remote attackers to spoof restricted packets, and read or write to the runtime state, by leveraging the ability to reach the ntpd machine's network interface with a packet from the ::1 address.

CVSS2: 6.8
EPSS: Низкий
redhat логотип

CVE-2014-9751

почти 11 лет назад

The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before 4.2.8p1 on Linux and OS X does not properly determine whether a source IP address is an IPv6 loopback address, which makes it easier for remote attackers to spoof restricted packets, and read or write to the runtime state, by leveraging the ability to reach the ntpd machine's network interface with a packet from the ::1 address.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-2014-9751

около 10 лет назад

The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before 4.2.8p1 on Linux and OS X does not properly determine whether a source IP address is an IPv6 loopback address, which makes it easier for remote attackers to spoof restricted packets, and read or write to the runtime state, by leveraging the ability to reach the ntpd machine's network interface with a packet from the ::1 address.

CVSS2: 6.8
EPSS: Низкий
debian логотип

CVE-2014-9751

около 10 лет назад

The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before ...

CVSS2: 6.8
EPSS: Низкий
github логотип

GHSA-ffj6-rf7h-c479

больше 3 лет назад

The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before 4.2.8p1 on Linux and OS X does not properly determine whether a source IP address is an IPv6 loopback address, which makes it easier for remote attackers to spoof restricted packets, and read or write to the runtime state, by leveraging the ability to reach the ntpd machine's network interface with a packet from the ::1 address.

EPSS: Низкий
oracle-oval логотип

ELSA-2015-2231

почти 10 лет назад

ELSA-2015-2231: ntp security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2014-9751

The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before 4.2.8p1 on Linux and OS X does not properly determine whether a source IP address is an IPv6 loopback address, which makes it easier for remote attackers to spoof restricted packets, and read or write to the runtime state, by leveraging the ability to reach the ntpd machine's network interface with a packet from the ::1 address.

CVSS2: 6.8
10%
Низкий
около 10 лет назад
redhat логотип
CVE-2014-9751

The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before 4.2.8p1 on Linux and OS X does not properly determine whether a source IP address is an IPv6 loopback address, which makes it easier for remote attackers to spoof restricted packets, and read or write to the runtime state, by leveraging the ability to reach the ntpd machine's network interface with a packet from the ::1 address.

CVSS2: 5
10%
Низкий
почти 11 лет назад
nvd логотип
CVE-2014-9751

The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before 4.2.8p1 on Linux and OS X does not properly determine whether a source IP address is an IPv6 loopback address, which makes it easier for remote attackers to spoof restricted packets, and read or write to the runtime state, by leveraging the ability to reach the ntpd machine's network interface with a packet from the ::1 address.

CVSS2: 6.8
10%
Низкий
около 10 лет назад
debian логотип
CVE-2014-9751

The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before ...

CVSS2: 6.8
10%
Низкий
около 10 лет назад
github логотип
GHSA-ffj6-rf7h-c479

The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before 4.2.8p1 on Linux and OS X does not properly determine whether a source IP address is an IPv6 loopback address, which makes it easier for remote attackers to spoof restricted packets, and read or write to the runtime state, by leveraging the ability to reach the ntpd machine's network interface with a packet from the ::1 address.

10%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2015-2231

ELSA-2015-2231: ntp security, bug fix, and enhancement update (MODERATE)

почти 10 лет назад

Уязвимостей на страницу