NTP prior to 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote malicious users to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ntp ntp 4.2.5 |
||
ntp ntp |
||
ntp ntp 4.2.8 |
||
canonical ubuntu linux 12.04 |
||
redhat enterprise linux desktop 6.0 |
||
redhat enterprise linux desktop 7.0 |
||
redhat enterprise linux server 6.0 |
||
redhat enterprise linux server 7.0 |
||
redhat enterprise linux server aus 7.3 |
||
redhat enterprise linux server aus 7.4 |
||
redhat enterprise linux server aus 7.6 |
||
redhat enterprise linux server aus 7.7 |
||
redhat enterprise linux server eus 7.3 |
||
redhat enterprise linux server eus 7.4 |
||
redhat enterprise linux server eus 7.5 |
||
redhat enterprise linux server eus 7.6 |
||
redhat enterprise linux server eus 7.7 |
||
redhat enterprise linux server tus 7.3 |
||
redhat enterprise linux server tus 7.6 |
||
redhat enterprise linux server tus 7.7 |
||
redhat enterprise linux workstation 6.0 |
||
redhat enterprise linux workstation 7.0 |
||
hpe hpux-ntp |