Ntp

Ntp

99 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 14.52%
  • Published 13.01.2017 16:59:00
  • Last modified 20.04.2025 01:37:25

The control mode (mode 6) functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to set or unset traps via a crafted control mode packet.

  • EPSS 18.26%
  • Published 13.01.2017 16:59:00
  • Last modified 20.04.2025 01:37:25

ntpd in NTP before 4.2.8p9, when the trap service is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted packet.

  • EPSS 19.05%
  • Published 13.01.2017 16:59:00
  • Last modified 20.04.2025 01:37:25

ntpd in NTP before 4.2.8p9, when running on Windows, allows remote attackers to cause a denial of service via a large UDP packet.

  • EPSS 36.23%
  • Published 13.01.2017 16:59:00
  • Last modified 20.04.2025 01:37:25

NTP before 4.2.8p9 does not properly perform the initial sync calculations, which allows remote attackers to unspecified impact via unknown vectors, related to a "root distance that did not include the peer dispersion."

  • EPSS 1.67%
  • Published 06.01.2017 21:59:00
  • Last modified 20.04.2025 01:37:25

An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest k...

  • EPSS 1.05%
  • Published 06.01.2017 21:59:00
  • Last modified 20.04.2025 01:37:25

A malicious authenticated peer can create arbitrarily-many ephemeral associations in order to win the clock selection algorithm in ntpd in NTP 4.2.8p4 and earlier and NTPsec 3e160db8dc248a0bcb053b56a80167dc742d2b74 and a5fb34b9cc89b92a8fef2f459004865...

Exploit
  • EPSS 1.65%
  • Published 06.01.2017 21:59:00
  • Last modified 20.04.2025 01:37:25

An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer->dst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c5...

  • EPSS 1.88%
  • Published 06.01.2017 21:59:00
  • Last modified 20.04.2025 01:37:25

An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an exi...

Exploit
  • EPSS 0.85%
  • Published 06.01.2017 21:59:00
  • Last modified 23.05.2025 02:15:39

An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp....

  • EPSS 57.88%
  • Published 05.07.2016 01:59:04
  • Last modified 12.04.2025 10:46:40

ntpd in NTP before 4.2.8p8 allows remote attackers to cause a denial of service (daemon crash) via a crypto-NAK packet. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-1547.