5
CVSSv2

CVE-2016-4953

Published: 05/07/2016 Updated: 16/07/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

ntpd in NTP 4.x prior to 4.2.8p8 allows remote malicious users to cause a denial of service (ephemeral-association demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ntp ntp

ntp ntp 4.2.8

oracle solaris 10

oracle solaris 11.3

suse manager 2.1

suse manager proxy 2.1

suse openstack cloud 5

opensuse leap 42.1

opensuse opensuse 13.2

suse linux enterprise desktop 12

suse linux enterprise server 11

suse linux enterprise server 12

siemens simatic_net_cp_443-1_opc_ua_firmware

siemens tim_4r-ie_firmware

siemens tim_4r-ie_dnp3_firmware

Vendor Advisories

It was discovered that ntpd as a client did not correctly check the originate timestamp in received packets A remote attacker could use this flaw to send a crafted packet to an ntpd client that would effectively disable synchronization with the server, or push arbitrary offset/delay measurements to modify the time on the client (CVE-2015-8138) A ...
ntpd in NTP 4x before 428p8 allows remote attackers to cause a denial of service (ephemeral-association demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time ...

References

CWE-287http://www.kb.cert.org/vuls/id/321640http://support.ntp.org/bin/view/Main/NtpBug3045http://bugs.ntp.org/3045http://support.ntp.org/bin/view/Main/SecurityNoticehttp://lists.opensuse.org/opensuse-security-announce/2016-06/msg00023.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-06/msg00028.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-06/msg00040.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlhttp://www.securityfocus.com/bid/91010https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03757en_ushttps://security.gentoo.org/glsa/201607-15http://www.securitytracker.com/id/1036037https://security.FreeBSD.org/advisories/FreeBSD-SA-16:24.ntp.aschttps://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdfhttps://us-cert.cisa.gov/ics/advisories/icsa-21-103-11https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdfhttp://www.securityfocus.com/archive/1/archive/1/538600/100/0/threadedhttp://www.securityfocus.com/archive/1/archive/1/538599/100/0/threadedhttp://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.htmlhttp://www.securityfocus.com/archive/1/archive/1/540683/100/0/threadedhttp://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.htmlhttp://www.securityfocus.com/archive/1/538599/100/0/threadedhttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160603-ntpdhttp://www.securityfocus.com/archive/1/538600/100/0/threadedhttps://us-cert.cisa.gov/ics/advisories/icsa-21-159-11http://www.securityfocus.com/archive/1/540683/100/0/threadedhttps://www.kb.cert.org/vuls/id/321640http://packetstormsecurity.com/files/137321/Slackware-Security-Advisory-ntp-Updates.htmlhttp://packetstormsecurity.com/files/137322/FreeBSD-Security-Advisory-FreeBSD-SA-16-24.ntp.htmlhttps://nvd.nist.govhttps://alas.aws.amazon.com/ALAS-2016-649.htmlhttps://www.kb.cert.org/vuls/id/321640