Filtered by vendor Ntp
Subscribe
Total
99 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2015-8138 | 1 Ntp | 1 Ntp | 2024-02-28 | 5.0 MEDIUM | 5.3 MEDIUM |
NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero. | |||||
CVE-2015-7848 | 1 Ntp | 1 Ntp-dev | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash. | |||||
CVE-2017-6463 | 1 Ntp | 1 Ntp | 2024-02-28 | 4.0 MEDIUM | 6.5 MEDIUM |
NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote authenticated users to cause a denial of service (daemon crash) via an invalid setting in a :config directive, related to the unpeer option. | |||||
CVE-2016-9311 | 1 Ntp | 1 Ntp | 2024-02-28 | 7.1 HIGH | 5.9 MEDIUM |
ntpd in NTP before 4.2.8p9, when the trap service is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted packet. | |||||
CVE-2016-9310 | 1 Ntp | 1 Ntp | 2024-02-28 | 6.4 MEDIUM | 6.5 MEDIUM |
The control mode (mode 6) functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to set or unset traps via a crafted control mode packet. | |||||
CVE-2017-6458 | 4 Apple, Hpe, Ntp and 1 more | 5 Mac Os X, Hpux-ntp, Ntp and 2 more | 2024-02-28 | 6.5 MEDIUM | 8.8 HIGH |
Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable. | |||||
CVE-2016-1547 | 1 Ntp | 1 Ntp | 2024-02-28 | 5.0 MEDIUM | 5.3 MEDIUM |
An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled. | |||||
CVE-2015-8158 | 1 Ntp | 1 Ntp | 2024-02-28 | 4.3 MEDIUM | 5.9 MEDIUM |
The getresponse function in ntpq in NTP versions before 4.2.8p9 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (infinite loop) via crafted packets with incorrect values. | |||||
CVE-2015-8140 | 1 Ntp | 1 Ntp | 2024-02-28 | 5.8 MEDIUM | 4.8 MEDIUM |
The ntpq protocol in NTP before 4.2.8p7 allows remote attackers to conduct replay attacks by sniffing the network. | |||||
CVE-2015-7973 | 5 Canonical, Freebsd, Netapp and 2 more | 9 Ubuntu Linux, Freebsd, Clustered Data Ontap and 6 more | 2024-02-28 | 5.8 MEDIUM | 6.5 MEDIUM |
NTP before 4.2.8p6 and 4.3.x before 4.3.90, when configured in broadcast mode, allows man-in-the-middle attackers to conduct replay attacks by sniffing the network. | |||||
CVE-2016-9312 | 2 Microsoft, Ntp | 2 Windows, Ntp | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
ntpd in NTP before 4.2.8p9, when running on Windows, allows remote attackers to cause a denial of service via a large UDP packet. | |||||
CVE-2016-2516 | 1 Ntp | 1 Ntp | 2024-02-28 | 7.1 HIGH | 5.3 MEDIUM |
NTP before 4.2.8p7 and 4.3.x before 4.3.92, when mode7 is enabled, allows remote attackers to cause a denial of service (ntpd abort) by using the same IP address multiple times in an unconfig directive. | |||||
CVE-2017-6452 | 1 Ntp | 1 Ntp | 2024-02-28 | 4.6 MEDIUM | 7.8 HIGH |
Stack-based buffer overflow in the Windows installer for NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via an application path on the command line. | |||||
CVE-2015-7978 | 1 Ntp | 1 Ntp | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
NTP before 4.2.8p6 and 4.3.0 before 4.3.90 allows a remote attackers to cause a denial of service (stack exhaustion) via an ntpdc relist command, which triggers recursive traversal of the restriction list. | |||||
CVE-2016-7426 | 4 Canonical, Hpe, Ntp and 1 more | 9 Ubuntu Linux, Hpux-ntp, Ntp and 6 more | 2024-02-28 | 4.3 MEDIUM | 7.5 HIGH |
NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address. | |||||
CVE-2015-8139 | 1 Ntp | 1 Ntp | 2024-02-28 | 5.0 MEDIUM | 5.3 MEDIUM |
ntpq in NTP before 4.2.8p7 allows remote attackers to obtain origin timestamps and then impersonate peers via unspecified vectors. | |||||
CVE-2016-2518 | 7 Debian, Freebsd, Netapp and 4 more | 18 Debian Linux, Freebsd, Clustered Data Ontap and 15 more | 2024-02-28 | 5.0 MEDIUM | 5.3 MEDIUM |
The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value. | |||||
CVE-2016-7434 | 2 Hpe, Ntp | 2 Hpux-ntp, Ntp | 2024-02-28 | 4.3 MEDIUM | 7.5 HIGH |
The read_mru_list function in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (crash) via a crafted mrulist query. | |||||
CVE-2017-6460 | 1 Ntp | 1 Ntp | 2024-02-28 | 6.5 MEDIUM | 8.8 HIGH |
Stack-based buffer overflow in the reslist function in ntpq in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote servers have unspecified impact via a long flagstr variable in a restriction list response. | |||||
CVE-2016-2517 | 1 Ntp | 1 Ntp | 2024-02-28 | 4.9 MEDIUM | 5.3 MEDIUM |
NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (prevent subsequent authentication) by leveraging knowledge of the controlkey or requestkey and sending a crafted packet to ntpd, which changes the value of trustedkey, controlkey, or requestkey. NOTE: this vulnerability exists because of a CVE-2016-2516 regression. |