VYPR

rpm package

suse/yast2-ntp-client&distro=SUSE Linux Enterprise Software Development Kit 12

pkg:rpm/suse/yast2-ntp-client&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012

Vulnerabilities (28)

  • CVE-2015-7979HigJan 30, 2017
    affected < 3.1.12.4-8.2fixed 3.1.12.4-8.2

    NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (client-server association tear down) by sending broadcast packets with invalid authentication to a broadcast client.

  • CVE-2015-7978HigJan 30, 2017
    affected < 3.1.12.4-8.2fixed 3.1.12.4-8.2

    NTP before 4.2.8p6 and 4.3.0 before 4.3.90 allows a remote attackers to cause a denial of service (stack exhaustion) via an ntpdc relist command, which triggers recursive traversal of the restriction list.

  • CVE-2015-7977MedJan 30, 2017
    affected < 3.1.12.4-8.2fixed 3.1.12.4-8.2

    ntpd in NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (NULL pointer dereference) via a ntpdc reslist command.

  • CVE-2015-7976MedJan 30, 2017
    affected < 3.1.12.4-8.2fixed 3.1.12.4-8.2

    The ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.

  • CVE-2015-7975MedJan 30, 2017
    affected < 3.1.12.4-8.2fixed 3.1.12.4-8.2

    The nextvar function in NTP before 4.2.8p6 and 4.3.x before 4.3.90 does not properly validate the length of its input, which allows an attacker to cause a denial of service (application crash).

  • CVE-2015-7973MedJan 30, 2017
    affected < 3.1.12.4-8.2fixed 3.1.12.4-8.2

    NTP before 4.2.8p6 and 4.3.x before 4.3.90, when configured in broadcast mode, allows man-in-the-middle attackers to conduct replay attacks by sniffing the network.

  • CVE-2015-7848Jan 6, 2017
    affected < 3.1.12.4-8.2fixed 3.1.12.4-8.2

    An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP dae

  • CVE-2015-7974HigJan 26, 2016
    affected < 3.1.12.4-8.2fixed 3.1.12.4-8.2

    NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."

Page 2 of 2