High severity7.5NVD Advisory· Published Jul 21, 2017· Updated May 13, 2026
CVE-2015-5195
CVE-2015-5195
Description
ntp_openssl.m4 in ntpd in NTP before 4.2.7p112 allows remote attackers to cause a denial of service (segmentation fault) via a crafted statistics or filegen configuration command that is not enabled during compilation.
Affected products
18cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
17- www.openwall.com/lists/oss-security/2015/08/25/3nvdMailing ListPatchThird Party Advisory
- github.com/ntp-project/ntp/commit/52e977d79a0c4ace997e5c74af429844da2f27benvdIssue TrackingPatchThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2015-November/170926.htmlnvdThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2015-October/169167.htmlnvdThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2015-September/166992.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2016-0780.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2016-2583.htmlnvdThird Party Advisory
- www.debian.org/security/2015/dsa-3388nvdThird Party Advisory
- www.securityfocus.com/bid/76474nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-2783-1nvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue Tracking
- www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.htmlnvd
News mentions
0No linked articles in our index yet.