Ntp

Ntp

99 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.28%
  • Published 05.07.2016 01:59:03
  • Last modified 12.04.2025 10:46:40

ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (interleaved-mode transition and time change) via a spoofed broadcast packet. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-1548.

  • EPSS 5.19%
  • Published 05.07.2016 01:59:02
  • Last modified 12.04.2025 10:46:40

ntpd in NTP 4.x before 4.2.8p8, when autokey is enabled, allows remote attackers to cause a denial of service (peer-variable clearing and association outage) by sending (1) a spoofed crypto-NAK packet or (2) a packet with an incorrect MAC value at a ...

  • EPSS 2.18%
  • Published 05.07.2016 01:59:01
  • Last modified 12.04.2025 10:46:40

The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstr...

  • EPSS 12.64%
  • Published 05.07.2016 01:59:00
  • Last modified 12.04.2025 10:46:40

ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (ephemeral-association demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time.

Exploit
  • EPSS 3.67%
  • Published 26.01.2016 19:59:00
  • Last modified 12.04.2025 10:46:40

NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."

  • EPSS 9.65%
  • Published 06.10.2015 01:59:02
  • Last modified 12.04.2025 10:46:40

The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before 4.2.8p1 on Linux and OS X does not properly determine whether a source IP address is an IPv6 loopback address, which makes it easier for remote attackers to spoof restricted packe...

  • EPSS 10.16%
  • Published 06.10.2015 01:59:00
  • Last modified 12.04.2025 10:46:40

ntp_crypto.c in ntpd in NTP 4.x before 4.2.8p1, when Autokey Authentication is enabled, allows remote attackers to obtain sensitive information from process memory or cause a denial of service (daemon crash) via a packet containing an extension field...

  • EPSS 0.6%
  • Published 08.04.2015 10:59:05
  • Last modified 12.04.2025 10:46:40

The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial...

  • EPSS 0.58%
  • Published 08.04.2015 10:59:04
  • Last modified 12.04.2025 10:46:40

The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p2 requires a correct MAC only if the MAC field has a nonzero length, which makes it easier for man-in-the-middle attackers to spoof packets by omitting t...

Exploit
  • EPSS 20.11%
  • Published 20.12.2014 02:59:03
  • Last modified 12.04.2025 10:46:40

The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets.