First published: Fri Jan 06 2017(Updated: )
An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ntp Ntp-dev | =4.3.70 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7848 is considered a high severity vulnerability due to the potential for remote code execution.
To fix CVE-2015-7848, upgrade NTP to version 4.3.71 or later where the vulnerability has been patched.
CVE-2015-7848 is exploitable if an attacker can send specially crafted packets to the NTP daemon.
CVE-2015-7848 affects NTP version 4.3.70 specifically in its handling of certain private mode packets.
CVE-2015-7848 describes an integer overflow vulnerability that could lead to an out-of-bounds memory copy.