A NULL pointer dereference flaw was found in the way ntpd processed 'ntpdc reslist' commands that queried restriction lists with a large amount of entries. A remote attacker could potentially use this flaw to crash ntpd.
Find out more about CVE-2015-7977 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue affects the versions of ntp as shipped with Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue in Red Hat Enterprise Linux 6 and 7. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
Base Score | 4.3 |
---|---|
Base Metrics | AV:N/AC:M/Au:N/C:N/I:N/A:P |
Access Vector | Network |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 6 (ntp) | RHSA-2016:0780 | 2016-05-10 |
Red Hat Enterprise Linux 7 (ntp) | RHSA-2016:2583 | 2016-11-03 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 5 | ntp | Will not fix |
Keep the number of restriction list entries in ntp.conf lower than 500.