Ntp

Ntp

99 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.53%
  • Published 08.01.2020 01:15:09
  • Last modified 21.11.2024 02:11:37

An Information Disclosure vulnerability exists in NTP 4.2.7p25 private (mode 6/7) messages via a GET_RESTRICT control message, which could let a malicious user obtain sensitive information.

Exploit
  • EPSS 8.16%
  • Published 15.05.2019 16:29:01
  • Last modified 21.11.2024 04:50:41

NTP through 4.2.8p12 has a NULL Pointer Dereference.

  • EPSS 1.38%
  • Published 18.04.2019 22:29:00
  • Last modified 21.11.2024 04:20:54

Network Time Protocol (NTP), as specified in RFC 5905, uses port 123 even for modes where a fixed port number is not required, which makes it easier for remote attackers to conduct off-path attacks.

Exploit
  • EPSS 19.24%
  • Published 20.06.2018 14:29:00
  • Last modified 21.11.2024 03:44:59

Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whet...

Exploit
  • EPSS 2.53%
  • Published 04.06.2018 20:29:00
  • Last modified 21.11.2024 03:00:29

An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate repl...

  • EPSS 14.25%
  • Published 08.03.2018 20:29:00
  • Last modified 21.11.2024 04:11:44

Buffer overflow in the decodearr function in ntpq in ntp 4.2.8p6 through 4.2.8p10 allows remote attackers to execute arbitrary code by leveraging an ntpq query and sending a response with a crafted array.

  • EPSS 16.93%
  • Published 06.03.2018 20:29:01
  • Last modified 14.01.2025 19:29:55

The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association ...

  • EPSS 6.02%
  • Published 06.03.2018 20:29:01
  • Last modified 14.01.2025 19:29:55

ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset ...

Exploit
  • EPSS 8.14%
  • Published 06.03.2018 20:29:01
  • Last modified 21.11.2024 04:11:44

The ctl_getitem method in ntpd in ntp-4.2.8p6 before 4.2.8p11 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mode 6 packet with a ntpd instance from 4.2.8p6 through 4.2.8p10.

  • EPSS 1.01%
  • Published 06.03.2018 20:29:01
  • Last modified 14.01.2025 19:29:55

ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sy...