First published: Thu Apr 28 2016(Updated: )
An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ntp | 1:4.2.8p12+dfsg-4 1:4.2.8p15+dfsg-1 | |
NTP ntp | <=4.2.8 | |
redhat/ntp | <4.2.8 | 4.2.8 |
Siemens SIMATIC NET CP 443-1 OPC UA | ||
Siemens TIM 4R-IE (incl. SIPLUS NET variants) | ||
Siemens TIM 4R-IE DNP3 (incl. SIPLUS NET variants) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.