CVE-2015-5300
Description
The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
NTP before 4.2.8p5 has a flaw in panic_gate re-enabling that lets remote attackers set arbitrary time or cause denial of service.
Vulnerability
The panic_gate check in NTP before version 4.2.8p5 is only re-enabled after the first change to the system clock that exceeds 128 milliseconds by default. When the NTP daemon is started with the -g option, this allows remote attackers to set the system clock to an arbitrary time. Without the -g option, an attacker can alter the time by up to 900 seconds by responding to an unspecified number of requests from trusted sources, leveraging a resulting denial of service (abort and restart) [1][3].
Exploitation
An attacker with network access to the NTP service (UDP port 123) can send specially crafted responses. When the daemon is started with -g, the attacker can set the time to any value. Without -g, the attacker must respond to multiple requests from trusted sources to shift the clock up to 900 seconds, eventually triggering an assertion failure and daemon crash/restart [2][4]. No authentication is required, but the victim must be configured to query the attacker-controlled NTP server or the attacker must be able to inject packets into the network path.
Impact
Successful exploitation results in denial of service (abort and restart of the NTP daemon) and, when using the -g option, arbitrary time manipulation. This can disrupt time-sensitive applications, break certificate validation, and hinder log correlation. The attacker does not gain code execution or elevated privileges but can significantly impair system availability and reliability [1][3].
Mitigation
The vulnerability is fixed in NTP 4.2.8p5 released January 2016 [3]. Users should upgrade to NTP 4.2.8p5 or later. Red Hat Enterprise Linux 6 and 7 received updated packages (ntp-4.2.6p5-19.el7_1.3 and ntp-4.2.6p5-5.el6_7.2) as part of RHSA-2015:1930 [1]. Siemens RUGGEDCOM ROX devices were also patched (versions 2.9.0 and later) [4]. If upgrading is not possible, avoid using the -g option and restrict NTP associations to trusted servers.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
63cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*
- cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
- cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*+ 5 more
- cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
- cpe:2.3:o:suse:manager_proxy:2.1:*:*:*:*:*:*:*
- cpe:2.3:o:suse:openstack_cloud:5:*:*:*:*:*:*:*
- osv-coords24 versionspkg:rpm/opensuse/ntp&distro=openSUSE%20Tumbleweedpkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSSpkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATApkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/ntp&distro=SUSE%20Manager%202.1pkg:rpm/suse/ntp&distro=SUSE%20Manager%20Proxy%202.1pkg:rpm/suse/ntp&distro=SUSE%20OpenStack%20Cloud%205pkg:rpm/suse/yast2-ntp-client&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/yast2-ntp-client&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1pkg:rpm/suse/yast2-ntp-client&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSSpkg:rpm/suse/yast2-ntp-client&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/yast2-ntp-client&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1pkg:rpm/suse/yast2-ntp-client&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/yast2-ntp-client&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/yast2-ntp-client&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012pkg:rpm/suse/yast2-ntp-client&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1
< 4.2.8p9-1.1+ 23 more
- (no CPE)range: < 4.2.8p9-1.1
- (no CPE)range: < 4.2.8p6-46.5.2
- (no CPE)range: < 4.2.8p6-8.2
- (no CPE)range: < 4.2.8p6-41.1
- (no CPE)range: < 4.2.8p6-41.1
- (no CPE)range: < 4.2.8p6-41.1
- (no CPE)range: < 4.2.8p6-8.2
- (no CPE)range: < 4.2.8p6-46.5.2
- (no CPE)range: < 4.2.8p6-8.2
- (no CPE)range: < 4.2.8p6-8.2
- (no CPE)range: < 4.2.8p6-46.5.2
- (no CPE)range: < 4.2.8p6-8.2
- (no CPE)range: < 4.2.8p6-41.1
- (no CPE)range: < 4.2.8p6-41.1
- (no CPE)range: < 4.2.8p6-41.1
- (no CPE)range: < 3.1.12.4-8.2
- (no CPE)range: < 3.1.22-6.2
- (no CPE)range: < 2.17.14.1-1.12.1
- (no CPE)range: < 3.1.12.4-8.2
- (no CPE)range: < 3.1.22-6.2
- (no CPE)range: < 3.1.12.4-8.2
- (no CPE)range: < 3.1.22-6.2
- (no CPE)range: < 3.1.12.4-8.2
- (no CPE)range: < 3.1.22-6.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
39- support.ntp.org/bin/view/Main/NtpBug2956nvdIssue TrackingPatchVendor Advisory
- support.ntp.org/bin/view/Main/SecurityNoticenvdIssue TrackingPatchVendor Advisory
- aix.software.ibm.com/aix/efixes/security/ntp_advisory5.ascnvdThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2015-November/170684.htmlnvdThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2015-November/170926.htmlnvdThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-updates/2016-05/msg00114.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1930.htmlnvdThird Party Advisory
- seclists.org/bugtraq/2016/Feb/164nvdMailing ListThird Party Advisory
- www.debian.org/security/2015/dsa-3388nvdThird Party Advisory
- www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/77312nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1034670nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-2783-1nvdThird Party Advisory
- bto.bluecoat.com/security-advisory/sa113nvdThird Party Advisory
- ics-cert.us-cert.gov/advisories/ICSA-15-356-01nvdThird Party AdvisoryUS Government Resource
- support.citrix.com/article/CTX220112nvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www.cs.bu.edu/~goldbe/NTPattack.htmlnvdThird Party Advisory
- www.freebsd.org/security/advisories/FreeBSD-SA-16:02.ntp.ascnvdThird Party Advisory
- www.ibm.com/support/home/docdisplaynvdThird Party Advisory
- www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.htmlnvdThird Party Advisory
- www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.htmlnvdThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue Tracking
- security.netapp.com/advisory/ntap-20171004-0001/nvd
News mentions
0No linked articles in our index yet.