CVE-2015-5146

ntpd in ntp before 4.2.8p3 with remote configuration enabled allows remote authenticated users with knowledge of the configuration password and access to a computer entrusted to perform remote configuration to cause a denial of service (service crash) via a NULL byte in a crafted configuration directive packet.
References
Link Resource
http://bugs.ntp.org/show_bug.cgi?id=2853 Issue Tracking Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170926.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169167.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166992.html Third Party Advisory
http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu Vendor Advisory
http://www.debian.org/security/2015/dsa-3388 Third Party Advisory
http://www.securityfocus.com/bid/75589 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1034168 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1238136 Issue Tracking Third Party Advisory
https://security.gentoo.org/glsa/201509-01 Mitigation Third Party Advisory VDB Entry
https://security.netapp.com/advisory/ntap-20180731-0003/
http://bugs.ntp.org/show_bug.cgi?id=2853 Issue Tracking Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170926.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169167.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166992.html Third Party Advisory
http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu Vendor Advisory
http://www.debian.org/security/2015/dsa-3388 Third Party Advisory
http://www.securityfocus.com/bid/75589 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1034168 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1238136 Issue Tracking Third Party Advisory
https://security.gentoo.org/glsa/201509-01 Mitigation Third Party Advisory VDB Entry
https://security.netapp.com/advisory/ntap-20180731-0003/
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:ntp:ntp:*:p2:*:*:*:*:*:*

History

21 Nov 2024, 02:32

Type Values Removed Values Added
References () http://bugs.ntp.org/show_bug.cgi?id=2853 - Issue Tracking, Third Party Advisory () http://bugs.ntp.org/show_bug.cgi?id=2853 - Issue Tracking, Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170926.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170926.html - Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169167.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169167.html - Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166992.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166992.html - Third Party Advisory
References () http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu - Vendor Advisory () http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu - Vendor Advisory
References () http://www.debian.org/security/2015/dsa-3388 - Third Party Advisory () http://www.debian.org/security/2015/dsa-3388 - Third Party Advisory
References () http://www.securityfocus.com/bid/75589 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/75589 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1034168 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1034168 - Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=1238136 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1238136 - Issue Tracking, Third Party Advisory
References () https://security.gentoo.org/glsa/201509-01 - Mitigation, Third Party Advisory, VDB Entry () https://security.gentoo.org/glsa/201509-01 - Mitigation, Third Party Advisory, VDB Entry
References () https://security.netapp.com/advisory/ntap-20180731-0003/ - () https://security.netapp.com/advisory/ntap-20180731-0003/ -

Information

Published : 2017-08-24 20:29

Updated : 2024-11-21 02:32


NVD link : CVE-2015-5146

Mitre link : CVE-2015-5146

CVE.ORG link : CVE-2015-5146


JSON object : View

Products Affected

debian

  • debian_linux

ntp

  • ntp

fedoraproject

  • fedora
CWE
CWE-20

Improper Input Validation