First published: Sun Jul 03 2016(Updated: )
Stack-based buffer overflow in the NTP time-server interface on Meinberg IMS-LANTIME M3000, IMS-LANTIME M1000, IMS-LANTIME M500, LANTIME M900, LANTIME M600, LANTIME M400, LANTIME M300, LANTIME M200, LANTIME M100, SyncFire 1100, and LCES devices with firmware before 6.20.004 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via a crafted parameter in a POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NTP | <=6.0 | |
Meinberg LANTIME M1000 | ||
Meinberg Lantime M3000 | ||
Meinberg Ims-lantime M500 | ||
Meinberg Lantime M100 | ||
Meinbergglobal Lantime M200 | ||
Meinberg Global Lantime M300 | ||
Meinberg Lantime M400 | ||
Meinberg Lantime M600 | ||
Meinberg Lantime M900 | ||
Meinberg LCES | ||
Meinberg Syncfire 1100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3962 is classified as a high severity vulnerability due to its potential for remote exploitation.
To fix CVE-2016-3962, you should update the affected devices to firmware version 6.20.004 or later.
CVE-2016-3962 affects various Meinberg NTP servers and devices running firmware prior to version 6.20.004.
CVE-2016-3962 is a stack-based buffer overflow vulnerability that can be exploited remotely.
Yes, CVE-2016-3962 can be exploited remotely by attackers, potentially allowing them unauthorized access.