ntp_request.c in ntpd in NTP prior to 4.2.4p8, and 4.2.5, allows remote malicious users to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ntp ntp |
||
ntp ntp 4.0.72 |
||
ntp ntp 4.0.73 |
||
ntp ntp 4.0.90 |
||
ntp ntp 4.0.91 |
||
ntp ntp 4.0.92 |
||
ntp ntp 4.0.93 |
||
ntp ntp 4.0.94 |
||
ntp ntp 4.0.95 |
||
ntp ntp 4.0.96 |
||
ntp ntp 4.0.97 |
||
ntp ntp 4.0.98 |
||
ntp ntp 4.0.99 |
||
ntp ntp 4.1.0 |
||
ntp ntp 4.1.2 |
||
ntp ntp 4.2.0 |
||
ntp ntp 4.2.2 |
||
ntp ntp 4.2.2p1 |
||
ntp ntp 4.2.2p2 |
||
ntp ntp 4.2.2p3 |
||
ntp ntp 4.2.5 |