Unrated severityNVD Advisory· Published Jun 4, 2018· Updated Sep 17, 2024
CVE-2016-9042
CVE-2016-9042
Description
An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.
Affected products
13- osv-coords12 versionspkg:rpm/opensuse/ntp&distro=openSUSE%20Tumbleweedpkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2
< 4.2.8p15-7.2+ 11 more
- (no CPE)range: < 4.2.8p15-7.2
- (no CPE)range: < 4.2.8p10-60.1
- (no CPE)range: < 4.2.8p10-60.1
- (no CPE)range: < 4.2.8p10-63.1
- (no CPE)range: < 4.2.8p10-60.1
- (no CPE)range: < 4.2.8p10-60.1
- (no CPE)range: < 4.2.8p10-46.23.1
- (no CPE)range: < 4.2.8p10-60.1
- (no CPE)range: < 4.2.8p10-63.1
- (no CPE)range: < 4.2.8p10-46.23.1
- (no CPE)range: < 4.2.8p10-60.1
- (no CPE)range: < 4.2.8p10-60.1
- Talos/Network Time Protocolv5Range: NTP 4.2.8p9
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
21- www.ubuntu.com/usn/USN-3349-1mitrevendor-advisoryx_refsource_UBUNTU
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/mitrevendor-advisoryx_refsource_FEDORA
- security.freebsd.org/advisories/FreeBSD-SA-17:03.ntp.ascmitrevendor-advisoryx_refsource_FREEBSD
- packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.htmlmitrex_refsource_MISC
- packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.htmlmitrex_refsource_MISC
- seclists.org/fulldisclosure/2017/Nov/7mitremailing-listx_refsource_FULLDISC
- seclists.org/fulldisclosure/2017/Sep/62mitremailing-listx_refsource_FULLDISC
- www.securityfocus.com/archive/1/540403/100/0/threadedmitremailing-listx_refsource_BUGTRAQ
- www.securityfocus.com/archive/1/archive/1/540403/100/0/threadedmitremailing-listx_refsource_BUGTRAQ
- www.securityfocus.com/archive/1/archive/1/540464/100/0/threadedmitremailing-listx_refsource_BUGTRAQ
- www.securityfocus.com/bid/97046mitrevdb-entryx_refsource_BID
- www.securitytracker.com/id/1038123mitrevdb-entryx_refsource_SECTRACK
- www.securitytracker.com/id/1039427mitrevdb-entryx_refsource_SECTRACK
- bto.bluecoat.com/security-advisory/sa147mitrex_refsource_CONFIRM
- cert-portal.siemens.com/productcert/pdf/ssa-211752.pdfmitrex_refsource_CONFIRM
- kc.mcafee.com/corporate/indexmitrex_refsource_CONFIRM
- support.apple.com/kb/HT208144mitrex_refsource_CONFIRM
- support.f5.com/csp/article/K39041624mitrex_refsource_CONFIRM
- support.hpe.com/hpsc/doc/public/displaymitrex_refsource_CONFIRM
- us-cert.cisa.gov/ics/advisories/icsa-21-159-11mitrex_refsource_MISC
- www.talosintelligence.com/vulnerability_reports/TALOS-2016-0260mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.