First published: Tue Jul 05 2016(Updated: )
The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SIMATIC NET CP 443-1 OPC UA | ||
NTP ntp | >=4.2.0<4.2.8 | |
NTP ntp | >=4.3.0<4.3.93 | |
NTP ntp | =4.2.8 | |
NTP ntp | =4.2.8-p1 | |
NTP ntp | =4.2.8-p1-beta1 | |
NTP ntp | =4.2.8-p1-beta2 | |
NTP ntp | =4.2.8-p1-beta3 | |
NTP ntp | =4.2.8-p1-beta4 | |
NTP ntp | =4.2.8-p1-beta5 | |
NTP ntp | =4.2.8-p1-rc1 | |
NTP ntp | =4.2.8-p1-rc2 | |
NTP ntp | =4.2.8-p2 | |
NTP ntp | =4.2.8-p2-rc1 | |
NTP ntp | =4.2.8-p2-rc2 | |
NTP ntp | =4.2.8-p2-rc3 | |
NTP ntp | =4.2.8-p3 | |
NTP ntp | =4.2.8-p3-rc1 | |
NTP ntp | =4.2.8-p3-rc2 | |
NTP ntp | =4.2.8-p3-rc3 | |
NTP ntp | =4.2.8-p4 | |
NTP ntp | =4.2.8-p5 | |
NTP ntp | =4.2.8-p6 | |
NTP ntp | =4.2.8-p7 | |
Oracle Solaris | =10 | |
Oracle Solaris | =11.3 | |
SUSE Manager | =2.1 | |
Suse Manager Proxy | =2.1 | |
SUSE OpenStack Cloud | =5 | |
openSUSE Leap | =42.1 | |
openSUSE openSUSE | =13.2 | |
SUSE Linux Enterprise Desktop | =12-sp1 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp4 | |
SUSE Linux Enterprise Server | =12-sp1 | |
Siemens Simatic Net Cp 443-1 Opc Ua Firmware | ||
Siemens SIMATIC NET CP 443-1 OPC UA | ||
Siemens Tim 4r-ie Firmware | ||
Siemens Tim 4r-ie | ||
Siemens Tim 4r-ie Dnp3 Firmware | ||
Siemens Tim 4r-ie Dnp3 | ||
Siemens TIM 4R-IE (incl. SIPLUS NET variants) | ||
Siemens TIM 4R-IE DNP3 (incl. SIPLUS NET variants) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.