VYPR

rpm package

suse/ntp&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP2

pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2

Vulnerabilities (29)

  • CVE-2020-15025Jun 24, 2020
    affected < 4.2.8p15-88.1fixed 4.2.8p15-88.1

    ntpd in ntp 4.2.8 before 4.2.8p15 and 4.3.x before 4.3.101 allows remote attackers to cause a denial of service (memory consumption) by sending packets, because memory is not freed in situations where a CMAC key is used and associated with a CMAC algorithm in the ntp.keys file.

  • CVE-2020-13817Jun 4, 2020
    affected < 4.2.8p15-88.1fixed 4.2.8p15-88.1

    ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows remote attackers to cause a denial of service (daemon exit or system time change) by predicting transmit timestamps for use in spoofed packets. The victim must be relying on unauthenticated IPv4 time sources. There must

  • CVE-2018-8956May 6, 2020
    affected < 4.2.8p15-88.1fixed 4.2.8p15-88.1

    ntpd in ntp 4.2.8p10, 4.2.8p11, 4.2.8p12 and 4.2.8p13 allow remote attackers to prevent a broadcast client from synchronizing its clock with a broadcast NTP server via soofed mode 3 and mode 5 packets. The attacker must either be a part of the same broadcast network or control a

  • CVE-2020-11868Apr 17, 2020
    affected < 4.2.8p15-88.1fixed 4.2.8p15-88.1

    ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a valid origin timestamp.

  • CVE-2019-8936May 15, 2019
    affected < 4.2.8p13-85.1fixed 4.2.8p13-85.1

    NTP through 4.2.8p12 has a NULL Pointer Dereference.

  • CVE-2018-12327Jun 20, 2018
    affected < 4.2.8p12-64.8.2fixed 4.2.8p12-64.8.2

    Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situa

  • CVE-2016-9042Jun 4, 2018
    affected < 4.2.8p10-60.1fixed 4.2.8p10-60.1

    An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will f

  • CVE-2018-7183Mar 8, 2018
    affected < 4.2.8p11-64.5.1fixed 4.2.8p11-64.5.1

    Buffer overflow in the decodearr function in ntpq in ntp 4.2.8p6 through 4.2.8p10 allows remote attackers to execute arbitrary code by leveraging an ntpq query and sending a response with a crafted array.

  • CVE-2018-7185Mar 6, 2018
    affected < 4.2.8p11-64.5.1fixed 4.2.8p11-64.5.1

    The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to res

  • CVE-2018-7184Mar 6, 2018
    affected < 4.2.8p11-64.5.1fixed 4.2.8p11-64.5.1

    ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of th

  • CVE-2018-7182Mar 6, 2018
    affected < 4.2.8p11-64.5.1fixed 4.2.8p11-64.5.1

    The ctl_getitem method in ntpd in ntp-4.2.8p6 before 4.2.8p11 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mode 6 packet with a ntpd instance from 4.2.8p6 through 4.2.8p10.

  • CVE-2018-7170Mar 6, 2018
    affected < 4.2.8p11-64.5.1fixed 4.2.8p11-64.5.1

    ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sybil attack. This issue exists

  • CVE-2015-5219HigJul 21, 2017
    affected < 4.2.8p9-55.1fixed 4.2.8p9-55.1

    The ULOGTOD function in ntp.d in SNTP before 4.2.7p366 does not properly perform type conversions from a precision value to a double, which allows remote attackers to cause a denial of service (infinite loop) via a crafted NTP packet.

  • CVE-2017-6464MedMar 27, 2017
    affected < 4.2.8p10-60.1fixed 4.2.8p10-60.1

    NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote attackers to cause a denial of service (ntpd crash) via a malformed mode configuration directive.

  • CVE-2017-6463MedMar 27, 2017
    affected < 4.2.8p10-60.1fixed 4.2.8p10-60.1

    NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote authenticated users to cause a denial of service (daemon crash) via an invalid setting in a :config directive, related to the unpeer option.

  • CVE-2017-6462HigMar 27, 2017
    affected < 4.2.8p10-60.1fixed 4.2.8p10-60.1

    Buffer overflow in the legacy Datum Programmable Time Server (DPTS) refclock driver in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via a crafted /dev/datum device.

  • CVE-2017-6460HigMar 27, 2017
    affected < 4.2.8p10-60.1fixed 4.2.8p10-60.1

    Stack-based buffer overflow in the reslist function in ntpq in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote servers have unspecified impact via a long flagstr variable in a restriction list response.

  • CVE-2017-6458HigMar 27, 2017
    affected < 4.2.8p10-60.1fixed 4.2.8p10-60.1

    Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.

  • CVE-2017-6451HigMar 27, 2017
    affected < 4.2.8p10-60.1fixed 4.2.8p10-60.1

    The mx4200_send function in the legacy MX4200 refclock in NTP before 4.2.8p10 and 4.3.x before 4.3.94 does not properly handle the return value of the snprintf function, which allows local users to execute arbitrary code via unspecified vectors, which trigger an out-of-bounds mem

  • CVE-2016-9311MedJan 13, 2017
    affected < 4.2.8p9-55.1fixed 4.2.8p9-55.1

    ntpd in NTP before 4.2.8p9, when the trap service is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted packet.

Page 1 of 2