First published: Mon Sep 25 2017(Updated: )
An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.
Credit: Cure53 Cure53 Cure53 Cure53 Cure53 Cure53 Cure53 Cure53 Cure53 Matthew Van Gundy Cisco talos-cna@cisco.com talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS High Sierra | <10.13 | 10.13 |
Siemens SIMATIC NET CP 443-1 OPC UA | ||
NTP ntp | =4.2.8-p9 | |
FreeBSD FreeBSD | =10.0 | |
FreeBSD FreeBSD | =11.0 | |
Hpe Hpux-ntp | <c.4.2.8.4.0 | |
All of | ||
Siemens Simatic Net Cp 443-1 Opc Ua Firmware | ||
Siemens SIMATIC NET CP 443-1 OPC UA | ||
Siemens Simatic Net Cp 443-1 Opc Ua Firmware | ||
Siemens SIMATIC NET CP 443-1 OPC UA | ||
debian/ntp | 1:4.2.8p15+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
Vulnerability CVE-2016-9042 is a denial of service vulnerability in ntpd 4.2.8p9.
The denial of service vulnerability in ntpd 4.2.8p9 can be exploited using a specially crafted unauthenticated network packet to reset the expected origin timestamp for target peers.
The severity of vulnerability CVE-2016-9042 is medium with a CVSS score of 5.9.
Software versions 4.2.8p9 of ntp and 10.0 and 11.0 of FreeBSD are affected by vulnerability CVE-2016-9042.
To fix vulnerability CVE-2016-9042, update to version 4.2.8p10 of ntp.