An out-of-bounds access flaw was found in the way ntpd processed certain packets. An authenticated attacker could use a crafted packet to create a peer association with hmode of 7 and larger, which could potentially (although highly unlikely) cause ntpd to crash.
Find out more about CVE-2016-2518 from the MITRE CVE dictionary dictionary and NIST NVD.
Base Score | 2.1 |
---|---|
Base Metrics | AV:N/AC:H/Au:S/C:N/I:N/A:P |
Access Vector | Network |
Access Complexity | High |
Authentication | Single |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 6 (ntp) | RHSA-2016:1141 | 2016-05-31 |
Red Hat Enterprise Linux Extended Update Support 6.7 (ntp) | RHSA-2016:1552 | 2016-08-03 |
Red Hat Enterprise Linux 7 (ntp) | RHSA-2016:1141 | 2016-05-31 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 5 | ntp | Not affected |