VYPR

rpm package

suse/ntp&distro=SUSE Linux Enterprise Desktop 12 SP1

pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1

Vulnerabilities (45)

  • CVE-2016-9042Jun 4, 2018
    affected < 4.2.8p10-60.1fixed 4.2.8p10-60.1

    An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will f

  • CVE-2015-7705CriAug 7, 2017
    affected < 4.2.8p7-11.1fixed 4.2.8p7-11.1

    The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.

  • CVE-2015-7704HigAug 7, 2017
    affected < 4.2.8p7-11.1fixed 4.2.8p7-11.1

    The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted "KOD" messages.

  • CVE-2015-5300HigJul 21, 2017
    affected < 4.2.8p6-8.2fixed 4.2.8p6-8.2

    The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to

  • CVE-2015-5219HigJul 21, 2017
    affected < 4.2.8p9-55.1fixed 4.2.8p9-55.1

    The ULOGTOD function in ntp.d in SNTP before 4.2.7p366 does not properly perform type conversions from a precision value to a double, which allows remote attackers to cause a denial of service (infinite loop) via a crafted NTP packet.

  • CVE-2017-6464MedMar 27, 2017
    affected < 4.2.8p10-60.1fixed 4.2.8p10-60.1

    NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote attackers to cause a denial of service (ntpd crash) via a malformed mode configuration directive.

  • CVE-2017-6463MedMar 27, 2017
    affected < 4.2.8p10-60.1fixed 4.2.8p10-60.1

    NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote authenticated users to cause a denial of service (daemon crash) via an invalid setting in a :config directive, related to the unpeer option.

  • CVE-2017-6462HigMar 27, 2017
    affected < 4.2.8p10-60.1fixed 4.2.8p10-60.1

    Buffer overflow in the legacy Datum Programmable Time Server (DPTS) refclock driver in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via a crafted /dev/datum device.

  • CVE-2017-6460HigMar 27, 2017
    affected < 4.2.8p10-60.1fixed 4.2.8p10-60.1

    Stack-based buffer overflow in the reslist function in ntpq in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote servers have unspecified impact via a long flagstr variable in a restriction list response.

  • CVE-2017-6458HigMar 27, 2017
    affected < 4.2.8p10-60.1fixed 4.2.8p10-60.1

    Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.

  • CVE-2017-6451HigMar 27, 2017
    affected < 4.2.8p10-60.1fixed 4.2.8p10-60.1

    The mx4200_send function in the legacy MX4200 refclock in NTP before 4.2.8p10 and 4.3.x before 4.3.94 does not properly handle the return value of the snprintf function, which allows local users to execute arbitrary code via unspecified vectors, which trigger an out-of-bounds mem

  • CVE-2016-2519MedJan 30, 2017
    affected < 4.2.8p7-11.1fixed 4.2.8p7-11.1

    ntpd in NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (ntpd abort) by a large request data value, which triggers the ctl_getitem function to return a NULL value.

  • CVE-2016-2518MedJan 30, 2017
    affected < 4.2.8p7-11.1fixed 4.2.8p7-11.1

    The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.

  • CVE-2016-2517MedJan 30, 2017
    affected < 4.2.8p7-11.1fixed 4.2.8p7-11.1

    NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (prevent subsequent authentication) by leveraging knowledge of the controlkey or requestkey and sending a crafted packet to ntpd, which changes the value of trustedkey, controlkey, or

  • CVE-2016-2516MedJan 30, 2017
    affected < 4.2.8p7-11.1fixed 4.2.8p7-11.1

    NTP before 4.2.8p7 and 4.3.x before 4.3.92, when mode7 is enabled, allows remote attackers to cause a denial of service (ntpd abort) by using the same IP address multiple times in an unconfig directive.

  • CVE-2015-8158MedJan 30, 2017
    affected < 4.2.8p6-8.2fixed 4.2.8p6-8.2

    The getresponse function in ntpq in NTP versions before 4.2.8p9 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (infinite loop) via crafted packets with incorrect values.

  • CVE-2015-8140MedJan 30, 2017
    affected < 4.2.8p6-8.2fixed 4.2.8p6-8.2

    The ntpq protocol in NTP before 4.2.8p7 allows remote attackers to conduct replay attacks by sniffing the network.

  • CVE-2015-8139MedJan 30, 2017
    affected < 4.2.8p6-8.2fixed 4.2.8p6-8.2

    ntpq in NTP before 4.2.8p7 allows remote attackers to obtain origin timestamps and then impersonate peers via unspecified vectors.

  • CVE-2015-8138MedJan 30, 2017
    affected < 4.2.8p6-8.2fixed 4.2.8p6-8.2

    NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.

  • CVE-2015-7979HigJan 30, 2017
    affected < 4.2.8p6-8.2fixed 4.2.8p6-8.2

    NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (client-server association tear down) by sending broadcast packets with invalid authentication to a broadcast client.

Page 1 of 3