CVSSv4: NA |
CVSSv3: 6.5 |
CVSSv2: 6.4 |
VMScore: 750 |
EPSS: 0.14524 |
KEV: Not Included
Published: 13/01/2017 Updated: 21/11/2024
Vulnerability Summary
The control mode (mode 6) functionality in ntpd in NTP prior to 4.2.8p9 allows remote malicious users to set or unset traps via a crafted control mode packet.
Synopsis
Moderate: ntp security update
Type/Severity
Security Advisory: Moderate
Topic
An update for ntp is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring Syste ...
Ephemeral association time spoofing additional protectionntpd in ntp 42x before 428p7 and 43x before 4392 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sybil attack This issue exists because of an ...
The following security-related issues were resolved:
CVE-2016-7426: Client rate limiting and server responsesCVE-2016-7429: Attack on interface selectionCVE-2016-7433: Broken initial sync calculations regressionCVE-2016-9310: Mode 6 unauthenticated trap information disclosure and DDoS vectorCVE-2016-9311: Null pointer dereference when trap service ...
A flaw was found in the control mode functionality of ntpd A remote attacker could send a crafted control mode packet which could lead to information disclosure or result in DDoS amplification attacks ...
An exploitable configuration modification vulnerability exists in the control mode (mode 6) functionality of ntpd If, against long-standing BCP recommendations, "restrict default noquery " is not specified, a specially crafted control mode packet can set ntpd traps, providing information disclosure and DDoS amplification, and unset ntpd traps, ...