VYPR

rpm package

suse/ntp&distro=SUSE Linux Enterprise Server 12

pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2012

Vulnerabilities (47)

  • CVE-2015-7851Jan 28, 2020
    affected < 4.2.8p6-46.5.2fixed 4.2.8p6-46.5.2

    Directory traversal vulnerability in the save_config function in ntpd in ntp_control.c in NTP before 4.2.8p4, when used on systems that do not use '\' or '/' characters for directory separation such as OpenVMS, allows remote authenticated users to overwrite arbitrary files.

  • CVE-2015-3405HigAug 9, 2017
    affected < 4.2.6p5-44.1fixed 4.2.6p5-44.1

    ntp-keygen in ntp 4.2.8px before 4.2.8p2-RC2 and 4.3.x before 4.3.12 does not generate MD5 keys with sufficient entropy on big endian machines when the lowest order byte of the temp variable is between 0x20 and 0x7f and not #, which might allow remote attackers to obtain the valu

  • CVE-2015-7871CriAug 7, 2017
    affected < 4.2.8p6-46.5.2fixed 4.2.8p6-46.5.2

    Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.

  • CVE-2015-7855MedAug 7, 2017
    affected < 4.2.8p6-46.5.2fixed 4.2.8p6-46.5.2

    The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value.

  • CVE-2015-7854HigAug 7, 2017
    affected < 4.2.8p6-46.5.2fixed 4.2.8p6-46.5.2

    Buffer overflow in the password management functionality in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.

  • CVE-2015-7853CriAug 7, 2017
    affected < 4.2.8p6-46.5.2fixed 4.2.8p6-46.5.2

    The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.

  • CVE-2015-7852MedAug 7, 2017
    affected < 4.2.8p6-46.5.2fixed 4.2.8p6-46.5.2

    ntpq in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted mode 6 response packets.

  • CVE-2015-7850MedAug 7, 2017
    affected < 4.2.8p6-46.5.2fixed 4.2.8p6-46.5.2

    ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (infinite loop or crash) by pointing the key file at the log file.

  • CVE-2015-7849HigAug 7, 2017
    affected < 4.2.8p6-46.5.2fixed 4.2.8p6-46.5.2

    Use-after-free vulnerability in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to possibly execute arbitrary code or cause a denial of service (crash) via crafted packets.

  • CVE-2015-7705CriAug 7, 2017
    affected < 4.2.8p6-46.5.2fixed 4.2.8p6-46.5.2

    The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.

  • CVE-2015-7704HigAug 7, 2017
    affected < 4.2.8p6-46.5.2fixed 4.2.8p6-46.5.2

    The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted "KOD" messages.

  • CVE-2015-7702MedAug 7, 2017
    affected < 4.2.8p6-46.5.2fixed 4.2.8p6-46.5.2

    The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash). NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.

  • CVE-2015-7701HigAug 7, 2017
    affected < 4.2.8p6-46.5.2fixed 4.2.8p6-46.5.2

    Memory leak in the CRYPTO_ASSOC function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (memory consumption).

  • CVE-2015-7692HigAug 7, 2017
    affected < 4.2.8p6-46.5.2fixed 4.2.8p6-46.5.2

    The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash). NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.

  • CVE-2015-7691HigAug 7, 2017
    affected < 4.2.8p6-46.5.2fixed 4.2.8p6-46.5.2

    The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted packets containing particular autokey operations. NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-

  • CVE-2015-7703HigJul 24, 2017
    affected < 4.2.8p6-46.5.2fixed 4.2.8p6-46.5.2

    The "pidfile" or "driftfile" directives in NTP ntpd 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77, when ntpd is configured to allow remote configuration, allows remote attackers with an IP address that is allowed to send configuration requests, and with knowledge of the remote co

  • CVE-2015-5300HigJul 21, 2017
    affected < 4.2.8p6-46.5.2fixed 4.2.8p6-46.5.2

    The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to

  • CVE-2016-2519MedJan 30, 2017
    affected < 4.2.8p8-46.8.1fixed 4.2.8p8-46.8.1

    ntpd in NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (ntpd abort) by a large request data value, which triggers the ctl_getitem function to return a NULL value.

  • CVE-2016-2518MedJan 30, 2017
    affected < 4.2.8p8-46.8.1fixed 4.2.8p8-46.8.1

    The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.

  • CVE-2016-2517MedJan 30, 2017
    affected < 4.2.8p8-46.8.1fixed 4.2.8p8-46.8.1

    NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (prevent subsequent authentication) by leveraging knowledge of the controlkey or requestkey and sending a crafted packet to ntpd, which changes the value of trustedkey, controlkey, or

Page 1 of 3