CVE-2016-7429
Description
NTP before 4.2.8p9 changes the peer structure to the interface it receives the response from a source, which allows remote attackers to cause a denial of service (prevent communication with a source) by sending a response for a source to an interface the source does not use.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
NTP before 4.2.8p9 allows remote attackers to cause denial of service by spoofing responses to force interface selection change.
Vulnerability
In NTP versions ntp-4.2.7p385 up to but not including ntp-4.2.8p9, and ntp-4.3.0 up to but not including ntp-4.3.94, the ntpd process updates the peer structure to use the interface from which it receives a response, even if that interface differs from the one used for the original request. This behavior allows an attacker to manipulate the interface selection for a given source [4].
Exploitation
An attacker who knows the IP address of a legitimate NTP source can send a spoofed response packet with that source address to a different network interface on the target host. The attack requires that the operating system does not validate the source address of incoming packets (e.g., rp_filter set to 0 on Linux). By repeatedly sending such spoofed responses (e.g., once per second), the attacker can cause ntpd to continuously select the wrong interface for the source, preventing it from sending new requests to the legitimate source until the interface list is refreshed (which occurs on routing changes or every 5 minutes by default) [4].
Impact
Successful exploitation results in a denial of service: ntpd is unable to synchronize with the targeted NTP source. The attack does not require authentication or special privileges beyond network access to the target host's interfaces. The impact is limited to preventing time synchronization from the affected source, but if repeated, it can effectively block all communication with that source [4].
Mitigation
Upgrade to ntp-4.2.8p9 or later, or ntp-4.3.94 or later [4]. Red Hat has released updated packages for Red Hat Enterprise Linux 6 and 7 (ntp-4.2.6p5-10.el6_8.2 and ntp-4.2.6p5-25.el7_3.1) [1]. As a workaround, implement BCP-38 (ingress filtering) to prevent spoofed packets, configure firewalls to restrict which interfaces can receive packets from specific networks, and monitor ntpd instances with auto-restart configured (without the -g flag) [4].
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
21- osv-coords19 versionspkg:rpm/opensuse/ntp&distro=openSUSE%20Tumbleweedpkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSSpkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATApkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/ntp&distro=SUSE%20Manager%202.1pkg:rpm/suse/ntp&distro=SUSE%20Manager%20Proxy%202.1pkg:rpm/suse/ntp&distro=SUSE%20OpenStack%20Cloud%205
< 4.2.8p9-1.1+ 18 more
- (no CPE)range: < 4.2.8p9-1.1
- (no CPE)range: < 4.2.8p9-55.1
- (no CPE)range: < 4.2.8p9-55.1
- (no CPE)range: < 4.2.8p9-48.9.1
- (no CPE)range: < 4.2.8p9-48.9.1
- (no CPE)range: < 4.2.8p9-48.9.1
- (no CPE)range: < 4.2.8p9-48.9.1
- (no CPE)range: < 4.2.8p9-57.2
- (no CPE)range: < 4.2.8p9-55.1
- (no CPE)range: < 4.2.8p9-55.1
- (no CPE)range: < 4.2.8p9-46.18.1
- (no CPE)range: < 4.2.8p9-55.1
- (no CPE)range: < 4.2.8p9-57.2
- (no CPE)range: < 4.2.8p9-46.18.1
- (no CPE)range: < 4.2.8p9-55.1
- (no CPE)range: < 4.2.8p9-55.1
- (no CPE)range: < 4.2.8p9-48.9.1
- (no CPE)range: < 4.2.8p9-48.9.1
- (no CPE)range: < 4.2.8p9-48.9.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- nwtime.org/ntp428p9_release/nvdRelease NotesVendor Advisory
- support.ntp.org/bin/view/Main/NtpBug3072nvdIssue TrackingMitigationVendor Advisory
- support.ntp.org/bin/view/Main/SecurityNoticenvdVendor Advisory
- www.kb.cert.org/vuls/id/633847nvdThird Party AdvisoryUS Government Resource
- rhn.redhat.com/errata/RHSA-2017-0252.htmlnvd
- www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlnvd
- www.securityfocus.com/bid/94453nvd
- www.securitytracker.com/id/1037354nvd
- bto.bluecoat.com/security-advisory/sa139nvd
- h20566.www2.hpe.com/hpsc/doc/public/displaynvd
News mentions
0No linked articles in our index yet.