High severity7.5NVD Advisory· Published Jan 13, 2017· Updated May 13, 2026
CVE-2016-7426
CVE-2016-7426
Description
NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- nwtime.org/ntp428p9_release/nvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2017-0252.htmlnvdThird Party Advisory
- support.ntp.org/bin/view/Main/NtpBug3071nvdIssue TrackingMitigationVendor Advisory
- support.ntp.org/bin/view/Main/SecurityNoticenvdRelease NotesVendor Advisory
- www.securityfocus.com/bid/94451nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1037354nvdThird Party AdvisoryVDB Entry
- bto.bluecoat.com/security-advisory/sa139nvdThird Party Advisory
- h20566.www2.hpe.com/hpsc/doc/public/displaynvdThird Party Advisory
- security.freebsd.org/advisories/FreeBSD-SA-16:39.ntp.ascnvdThird Party Advisory
- usn.ubuntu.com/3707-2/nvdThird Party Advisory
- www.kb.cert.org/vuls/id/633847nvdThird Party AdvisoryUS Government Resource
News mentions
0No linked articles in our index yet.