CVE-2014-5209
- EPSS 0.53%
- Published 08.01.2020 01:15:09
- Last modified 21.11.2024 02:11:37
An Information Disclosure vulnerability exists in NTP 4.2.7p25 private (mode 6/7) messages via a GET_RESTRICT control message, which could let a malicious user obtain sensitive information.
CVE-2019-8936
- EPSS 8.16%
- Published 15.05.2019 16:29:01
- Last modified 21.11.2024 04:50:41
NTP through 4.2.8p12 has a NULL Pointer Dereference.
CVE-2019-11331
- EPSS 1.38%
- Published 18.04.2019 22:29:00
- Last modified 21.11.2024 04:20:54
Network Time Protocol (NTP), as specified in RFC 5905, uses port 123 even for modes where a fixed port number is not required, which makes it easier for remote attackers to conduct off-path attacks.
CVE-2018-12327
- EPSS 19.24%
- Published 20.06.2018 14:29:00
- Last modified 21.11.2024 03:44:59
Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whet...
CVE-2016-9042
- EPSS 2.53%
- Published 04.06.2018 20:29:00
- Last modified 21.11.2024 03:00:29
An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate repl...
CVE-2018-7183
- EPSS 14.25%
- Published 08.03.2018 20:29:00
- Last modified 21.11.2024 04:11:44
Buffer overflow in the decodearr function in ntpq in ntp 4.2.8p6 through 4.2.8p10 allows remote attackers to execute arbitrary code by leveraging an ntpq query and sending a response with a crafted array.
CVE-2018-7185
- EPSS 16.93%
- Published 06.03.2018 20:29:01
- Last modified 14.01.2025 19:29:55
The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association ...
CVE-2018-7184
- EPSS 6.02%
- Published 06.03.2018 20:29:01
- Last modified 14.01.2025 19:29:55
ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset ...
CVE-2018-7182
- EPSS 8.14%
- Published 06.03.2018 20:29:01
- Last modified 21.11.2024 04:11:44
The ctl_getitem method in ntpd in ntp-4.2.8p6 before 4.2.8p11 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mode 6 packet with a ntpd instance from 4.2.8p6 through 4.2.8p10.
CVE-2018-7170
- EPSS 1.01%
- Published 06.03.2018 20:29:01
- Last modified 14.01.2025 19:29:55
ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sy...