NA

CVE-2014-9298

Published: 06/10/2015 Updated: 07/11/2023

Vulnerability Summary

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage

Vulnerability Trend

Vendor Advisories

Synopsis Moderate: ntp security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic Updated ntp packages that fix multiple security issues, several bugs, andadd various enhancements are now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update a ...
Several security issues were fixed in NTP ...
It was <a href="bugsntporg/show_bugcgi?id=2671">reported</a> that ntp misses validation of vallen value, leading to various information leaks See for more details (CVE-2014-9297) It was <a href="bugsntporg/show_bugcgi?id=2672">reported</a> that ntp allows bypassing source IP ACLs on some OSes when :: ...
It was found that because NTP's access control was based on a source IP address, an attacker could bypass source IP restrictions and send malicious control and configuration packets by spoofing ::1 addresses ...