First published: Mon Jan 30 2017(Updated: )
The nextvar function in NTP before 4.2.8p6 and 4.3.x before 4.3.90 does not properly validate the length of its input, which allows an attacker to cause a denial of service (application crash).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NTP | <=4.2.8 | |
NTP | =4.3.0 | |
NTP | =4.3.1 | |
NTP | =4.3.2 | |
NTP | =4.3.3 | |
NTP | =4.3.4 | |
NTP | =4.3.5 | |
NTP | =4.3.6 | |
NTP | =4.3.7 | |
NTP | =4.3.8 | |
NTP | =4.3.10 | |
NTP | =4.3.11 | |
NTP | =4.3.12 | |
NTP | =4.3.13 | |
NTP | =4.3.14 | |
NTP | =4.3.15 | |
NTP | =4.3.16 | |
NTP | =4.3.17 | |
NTP | =4.3.18 | |
NTP | =4.3.19 | |
NTP | =4.3.20 | |
NTP | =4.3.21 | |
NTP | =4.3.22 | |
NTP | =4.3.23 | |
NTP | =4.3.24 | |
NTP | =4.3.25 | |
NTP | =4.3.26 | |
NTP | =4.3.27 | |
NTP | =4.3.28 | |
NTP | =4.3.29 | |
NTP | =4.3.30 | |
NTP | =4.3.31 | |
NTP | =4.3.32 | |
NTP | =4.3.33 | |
NTP | =4.3.34 | |
NTP | =4.3.35 | |
NTP | =4.3.36 | |
NTP | =4.3.37 | |
NTP | =4.3.38 | |
NTP | =4.3.39 | |
NTP | =4.3.40 | |
NTP | =4.3.41 | |
NTP | =4.3.42 | |
NTP | =4.3.43 | |
NTP | =4.3.44 | |
NTP | =4.3.45 | |
NTP | =4.3.46 | |
NTP | =4.3.47 | |
NTP | =4.3.48 | |
NTP | =4.3.49 | |
NTP | =4.3.50 | |
NTP | =4.3.51 | |
NTP | =4.3.52 | |
NTP | =4.3.53 | |
NTP | =4.3.54 | |
NTP | =4.3.55 | |
NTP | =4.3.56 | |
NTP | =4.3.57 | |
NTP | =4.3.58 | |
NTP | =4.3.59 | |
NTP | =4.3.60 | |
NTP | =4.3.61 | |
NTP | =4.3.62 | |
NTP | =4.3.63 | |
NTP | =4.3.64 | |
NTP | =4.3.65 | |
NTP | =4.3.66 | |
NTP | =4.3.67 | |
NTP | =4.3.68 | |
NTP | =4.3.69 | |
NTP | =4.3.70 | |
NTP | =4.3.71 | |
NTP | =4.3.72 | |
NTP | =4.3.73 | |
NTP | =4.3.74 | |
NTP | =4.3.75 | |
NTP | =4.3.76 | |
NTP | =4.3.77 | |
NTP | =4.3.78 | |
NTP | =4.3.79 | |
NTP | =4.3.80 | |
NTP | =4.3.81 | |
NTP | =4.3.82 | |
NTP | =4.3.83 | |
NTP | =4.3.84 | |
NTP | =4.3.85 | |
NTP | =4.3.86 | |
NTP | =4.3.87 | |
NTP | =4.3.88 | |
NTP | =4.3.89 | |
<=4.2.8 | ||
=4.3.0 | ||
=4.3.1 | ||
=4.3.2 | ||
=4.3.3 | ||
=4.3.4 | ||
=4.3.5 | ||
=4.3.6 | ||
=4.3.7 | ||
=4.3.8 | ||
=4.3.10 | ||
=4.3.11 | ||
=4.3.12 | ||
=4.3.13 | ||
=4.3.14 | ||
=4.3.15 | ||
=4.3.16 | ||
=4.3.17 | ||
=4.3.18 | ||
=4.3.19 | ||
=4.3.20 | ||
=4.3.21 | ||
=4.3.22 | ||
=4.3.23 | ||
=4.3.24 | ||
=4.3.25 | ||
=4.3.26 | ||
=4.3.27 | ||
=4.3.28 | ||
=4.3.29 | ||
=4.3.30 | ||
=4.3.31 | ||
=4.3.32 | ||
=4.3.33 | ||
=4.3.34 | ||
=4.3.35 | ||
=4.3.36 | ||
=4.3.37 | ||
=4.3.38 | ||
=4.3.39 | ||
=4.3.40 | ||
=4.3.41 | ||
=4.3.42 | ||
=4.3.43 | ||
=4.3.44 | ||
=4.3.45 | ||
=4.3.46 | ||
=4.3.47 | ||
=4.3.48 | ||
=4.3.49 | ||
=4.3.50 | ||
=4.3.51 | ||
=4.3.52 | ||
=4.3.53 | ||
=4.3.54 | ||
=4.3.55 | ||
=4.3.56 | ||
=4.3.57 | ||
=4.3.58 | ||
=4.3.59 | ||
=4.3.60 | ||
=4.3.61 | ||
=4.3.62 | ||
=4.3.63 | ||
=4.3.64 | ||
=4.3.65 | ||
=4.3.66 | ||
=4.3.67 | ||
=4.3.68 | ||
=4.3.69 | ||
=4.3.70 | ||
=4.3.71 | ||
=4.3.72 | ||
=4.3.73 | ||
=4.3.74 | ||
=4.3.75 | ||
=4.3.76 | ||
=4.3.77 | ||
=4.3.78 | ||
=4.3.79 | ||
=4.3.80 | ||
=4.3.81 | ||
=4.3.82 | ||
=4.3.83 | ||
=4.3.84 | ||
=4.3.85 | ||
=4.3.86 | ||
=4.3.87 | ||
=4.3.88 | ||
=4.3.89 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7975 is classified as a denial of service vulnerability that can cause an application crash.
CVE-2015-7975 affects NTP versions prior to 4.2.8p6 and 4.3.x before 4.3.90.
To fix CVE-2015-7975, upgrade NTP to version 4.2.8p6 or 4.3.90 or later.
Exploitation of CVE-2015-7975 can lead to denial of service, affecting the availability of time synchronization services.
While CVE-2015-7975 is specific to certain versions of NTP, similar vulnerabilities in network protocols are not uncommon.