5
CVSSv2

CVE-2015-8138

Published: 30/01/2017 Updated: 17/11/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

NTP prior to 4.2.8p6 and 4.3.x prior to 4.3.90 allows remote malicious users to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ntp ntp 4.3.10

ntp ntp 4.3.11

ntp ntp 4.3.19

ntp ntp 4.3.2

ntp ntp 4.3.26

ntp ntp 4.3.27

ntp ntp 4.3.33

ntp ntp 4.3.34

ntp ntp 4.3.35

ntp ntp 4.3.41

ntp ntp 4.3.15

ntp ntp 4.3.16

ntp ntp 4.3.22

ntp ntp 4.3.23

ntp ntp 4.3.3

ntp ntp 4.3.30

ntp ntp 4.3.38

ntp ntp 4.3.39

ntp ntp 4.3.45

ntp ntp 4.3.46

ntp ntp 4.3.52

ntp ntp 4.3.53

ntp ntp 4.3.60

ntp ntp 4.3.61

ntp ntp 4.3.68

ntp ntp 4.3.69

ntp ntp 4.3.75

ntp ntp 4.3.76

ntp ntp 4.3.77

ntp ntp 4.3.83

ntp ntp 4.3.84

ntp ntp 4.3.12

ntp ntp 4.3.13

ntp ntp 4.3.14

ntp ntp 4.3.20

ntp ntp 4.3.21

ntp ntp 4.3.28

ntp ntp 4.3.29

ntp ntp 4.3.36

ntp ntp 4.3.37

ntp ntp 4.3.43

ntp ntp 4.3.44

ntp ntp 4.3.50

ntp ntp 4.3.51

ntp ntp 4.3.59

ntp ntp 4.3.6

ntp ntp 4.3.66

ntp ntp 4.3.67

ntp ntp 4.3.73

ntp ntp 4.3.74

ntp ntp 4.3.81

ntp ntp 4.3.82

ntp ntp 4.3.89

ntp ntp

ntp ntp 4.3.42

ntp ntp 4.3.49

ntp ntp 4.3.5

ntp ntp 4.3.57

ntp ntp 4.3.58

ntp ntp 4.3.64

ntp ntp 4.3.65

ntp ntp 4.3.71

ntp ntp 4.3.72

ntp ntp 4.3.8

ntp ntp 4.3.80

ntp ntp 4.3.87

ntp ntp 4.3.88

ntp ntp 4.3.0

ntp ntp 4.3.1

ntp ntp 4.3.17

ntp ntp 4.3.18

ntp ntp 4.3.24

ntp ntp 4.3.25

ntp ntp 4.3.31

ntp ntp 4.3.32

ntp ntp 4.3.4

ntp ntp 4.3.40

ntp ntp 4.3.47

ntp ntp 4.3.48

ntp ntp 4.3.54

ntp ntp 4.3.55

ntp ntp 4.3.56

ntp ntp 4.3.62

ntp ntp 4.3.63

ntp ntp 4.3.7

ntp ntp 4.3.70

ntp ntp 4.3.78

ntp ntp 4.3.79

ntp ntp 4.3.85

ntp ntp 4.3.86

Vendor Advisories

Several security issues were fixed in NTP ...
It was discovered that ntpd as a client did not correctly check the originate timestamp in received packets A remote attacker could use this flaw to send a crafted packet to an ntpd client that would effectively disable synchronization with the server, or push arbitrary offset/delay measurements to modify the time on the client (CVE-2015-8138) A ...
It was discovered that ntpd as a client did not correctly check the originate timestamp in received packets A remote attacker could use this flaw to send a crafted packet to an ntpd client that would effectively disable synchronization with the server, or push arbitrary offset/delay measurements to modify the time on the client ...
Multiple Cisco products incorporate a version of the Network Time Protocol daemon (ntpd) package Versions of this package are affected by one or more vulnerabilities that could allow an unauthenticated, remote attacker to create a denial of service (DoS) condition or modify the time being advertised by a device acting as a Network Time Protocol (N ...

Recent Articles

Researchers tag new brace of bugs in NTP, but they're fixable
The Register • Richard Chirgwin • 28 Oct 2016

Party like it's 1985 1955 2015 WHAT DATE IS IT ANYWAY?

Back in January, Cisco dropped a bunch of NTP (network time protocol) patches; now, it's emerged that the research behind that round of fixes also turned up other bugs that haven't yet been fixed. This week, Ciscoans Matt Gundy and Jonathan Gardner teamed up with Boston University's Aanchal Malhotra, Mayank Varia, Haydn Kennedy and Sharon Goldberg to show off a bunch of possible attacks against NTP's datagram protocol. The bad news: the group reckons millions of IP addresses are currently vulner...

References

CWE-20https://www.kb.cert.org/vuls/id/718152https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161123-ntpdhttps://security.gentoo.org/glsa/201607-15https://bto.bluecoat.com/security-advisory/sa113http://www.ubuntu.com/usn/USN-3096-1http://www.securitytracker.com/id/1034782http://www.securityfocus.com/bid/81811http://www.debian.org/security/2016/dsa-3629http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpdhttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpdhttp://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Securityhttp://rhn.redhat.com/errata/RHSA-2016-0063.htmlhttp://lists.opensuse.org/opensuse-updates/2016-05/msg00114.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2016-January/176434.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlhttps://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_ushttps://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_ushttps://security.netapp.com/advisory/ntap-20171031-0001/https://security.netapp.com/advisory/ntap-20171004-0002/https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.aschttps://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdfhttps://us-cert.cisa.gov/ics/advisories/icsa-21-103-11https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdfhttps://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19https://usn.ubuntu.com/3096-1/https://nvd.nist.govhttps://www.kb.cert.org/vuls/id/718152