Ntp

Ntp

99 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.28%
  • Veröffentlicht 05.07.2016 01:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (interleaved-mode transition and time change) via a spoofed broadcast packet. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-1548.

  • EPSS 5.19%
  • Veröffentlicht 05.07.2016 01:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

ntpd in NTP 4.x before 4.2.8p8, when autokey is enabled, allows remote attackers to cause a denial of service (peer-variable clearing and association outage) by sending (1) a spoofed crypto-NAK packet or (2) a packet with an incorrect MAC value at a ...

  • EPSS 2.18%
  • Veröffentlicht 05.07.2016 01:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstr...

  • EPSS 12.64%
  • Veröffentlicht 05.07.2016 01:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (ephemeral-association demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time.

Exploit
  • EPSS 3.67%
  • Veröffentlicht 26.01.2016 19:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."

  • EPSS 9.65%
  • Veröffentlicht 06.10.2015 01:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before 4.2.8p1 on Linux and OS X does not properly determine whether a source IP address is an IPv6 loopback address, which makes it easier for remote attackers to spoof restricted packe...

  • EPSS 10.16%
  • Veröffentlicht 06.10.2015 01:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

ntp_crypto.c in ntpd in NTP 4.x before 4.2.8p1, when Autokey Authentication is enabled, allows remote attackers to obtain sensitive information from process memory or cause a denial of service (daemon crash) via a packet containing an extension field...

  • EPSS 0.6%
  • Veröffentlicht 08.04.2015 10:59:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial...

  • EPSS 0.58%
  • Veröffentlicht 08.04.2015 10:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p2 requires a correct MAC only if the MAC field has a nonzero length, which makes it easier for man-in-the-middle attackers to spoof packets by omitting t...

Exploit
  • EPSS 20.11%
  • Veröffentlicht 20.12.2014 02:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets.