The ULOGTOD function in ntp.d in SNTP before 4.2.7p366 does not properly perform type conversions from a precision value to a double, which allows remote attackers to cause a denial of service (infinite loop) via a crafted NTP packet.
The product does not correctly convert an object, resource, or structure from one type to a different type.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Fedora | Fedoraproject | 21 (including) | 21 (including) |
Fedora | Fedoraproject | 22 (including) | 22 (including) |
Fedora | Fedoraproject | 23 (including) | 23 (including) |
Red Hat Enterprise Linux 6 | RedHat | ntp-0:4.2.6p5-10.el6 | * |
Red Hat Enterprise Linux 7 | RedHat | ntp-0:4.2.6p5-25.el7 | * |
Ntp | Ubuntu | devel | * |
Ntp | Ubuntu | precise | * |
Ntp | Ubuntu | trusty | * |
Ntp | Ubuntu | upstream | * |
Ntp | Ubuntu | vivid | * |
Ntp | Ubuntu | vivid/stable-phone-overlay | * |
Ntp | Ubuntu | wily | * |