VYPR

rpm package

suse/ntp&distro=SUSE Linux Enterprise Server for SAP Applications 12

pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012

Vulnerabilities (64)

  • CVE-2017-6463MedMar 27, 2017
    affected < 4.2.8p10-46.23.1fixed 4.2.8p10-46.23.1

    NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote authenticated users to cause a denial of service (daemon crash) via an invalid setting in a :config directive, related to the unpeer option.

  • CVE-2017-6462HigMar 27, 2017
    affected < 4.2.8p10-46.23.1fixed 4.2.8p10-46.23.1

    Buffer overflow in the legacy Datum Programmable Time Server (DPTS) refclock driver in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via a crafted /dev/datum device.

  • CVE-2017-6460HigMar 27, 2017
    affected < 4.2.8p10-46.23.1fixed 4.2.8p10-46.23.1

    Stack-based buffer overflow in the reslist function in ntpq in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote servers have unspecified impact via a long flagstr variable in a restriction list response.

  • CVE-2017-6458HigMar 27, 2017
    affected < 4.2.8p10-46.23.1fixed 4.2.8p10-46.23.1

    Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.

  • CVE-2017-6451HigMar 27, 2017
    affected < 4.2.8p10-46.23.1fixed 4.2.8p10-46.23.1

    The mx4200_send function in the legacy MX4200 refclock in NTP before 4.2.8p10 and 4.3.x before 4.3.94 does not properly handle the return value of the snprintf function, which allows local users to execute arbitrary code via unspecified vectors, which trigger an out-of-bounds mem

  • CVE-2016-2519MedJan 30, 2017
    affected < 4.2.8p8-46.8.1fixed 4.2.8p8-46.8.1

    ntpd in NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (ntpd abort) by a large request data value, which triggers the ctl_getitem function to return a NULL value.

  • CVE-2016-2518MedJan 30, 2017
    affected < 4.2.8p8-46.8.1fixed 4.2.8p8-46.8.1

    The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.

  • CVE-2016-2517MedJan 30, 2017
    affected < 4.2.8p8-46.8.1fixed 4.2.8p8-46.8.1

    NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (prevent subsequent authentication) by leveraging knowledge of the controlkey or requestkey and sending a crafted packet to ntpd, which changes the value of trustedkey, controlkey, or

  • CVE-2016-2516MedJan 30, 2017
    affected < 4.2.8p8-46.8.1fixed 4.2.8p8-46.8.1

    NTP before 4.2.8p7 and 4.3.x before 4.3.92, when mode7 is enabled, allows remote attackers to cause a denial of service (ntpd abort) by using the same IP address multiple times in an unconfig directive.

  • CVE-2015-8158MedJan 30, 2017
    affected < 4.2.8p6-46.5.2fixed 4.2.8p6-46.5.2

    The getresponse function in ntpq in NTP versions before 4.2.8p9 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (infinite loop) via crafted packets with incorrect values.

  • CVE-2015-8140MedJan 30, 2017
    affected < 4.2.8p6-46.5.2fixed 4.2.8p6-46.5.2

    The ntpq protocol in NTP before 4.2.8p7 allows remote attackers to conduct replay attacks by sniffing the network.

  • CVE-2015-8139MedJan 30, 2017
    affected < 4.2.8p6-46.5.2fixed 4.2.8p6-46.5.2

    ntpq in NTP before 4.2.8p7 allows remote attackers to obtain origin timestamps and then impersonate peers via unspecified vectors.

  • CVE-2015-8138MedJan 30, 2017
    affected < 4.2.8p6-46.5.2fixed 4.2.8p6-46.5.2

    NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.

  • CVE-2015-7979HigJan 30, 2017
    affected < 4.2.8p6-46.5.2fixed 4.2.8p6-46.5.2

    NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (client-server association tear down) by sending broadcast packets with invalid authentication to a broadcast client.

  • CVE-2015-7978HigJan 30, 2017
    affected < 4.2.8p6-46.5.2fixed 4.2.8p6-46.5.2

    NTP before 4.2.8p6 and 4.3.0 before 4.3.90 allows a remote attackers to cause a denial of service (stack exhaustion) via an ntpdc relist command, which triggers recursive traversal of the restriction list.

  • CVE-2015-7977MedJan 30, 2017
    affected < 4.2.8p6-46.5.2fixed 4.2.8p6-46.5.2

    ntpd in NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (NULL pointer dereference) via a ntpdc reslist command.

  • CVE-2015-7976MedJan 30, 2017
    affected < 4.2.8p6-46.5.2fixed 4.2.8p6-46.5.2

    The ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.

  • CVE-2015-7975MedJan 30, 2017
    affected < 4.2.8p6-46.5.2fixed 4.2.8p6-46.5.2

    The nextvar function in NTP before 4.2.8p6 and 4.3.x before 4.3.90 does not properly validate the length of its input, which allows an attacker to cause a denial of service (application crash).

  • CVE-2015-7973MedJan 30, 2017
    affected < 4.2.8p6-46.5.2fixed 4.2.8p6-46.5.2

    NTP before 4.2.8p6 and 4.3.x before 4.3.90, when configured in broadcast mode, allows man-in-the-middle attackers to conduct replay attacks by sniffing the network.

  • CVE-2016-1551LowJan 27, 2017
    affected < 4.2.8p8-46.8.1fixed 4.2.8p8-46.8.1

    ntpd in NTP 4.2.8p3 and NTPsec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 relies on the underlying operating system to protect it from requests that impersonate reference clocks. Because reference clocks are treated like other peers and stored in the same structure, any packet with