A malicious authenticated peer can create arbitrarily-many ephemeral associations in order to win the clock selection algorithm in ntpd in NTP 4.2.8p4 and earlier and NTPsec 3e160db8dc248a0bcb053b56a80167dc742d2b74 and a5fb34b9cc89b92a8fef2f459004865c93bb7f92 and modify a victims clock.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ntp | Ntp | 4.2.8-p4 (including) | 4.2.8-p4 (including) |
Ntp | Ubuntu | devel | * |
Ntp | Ubuntu | esm-infra-legacy/trusty | * |
Ntp | Ubuntu | esm-infra/xenial | * |
Ntp | Ubuntu | precise | * |
Ntp | Ubuntu | trusty | * |
Ntp | Ubuntu | trusty/esm | * |
Ntp | Ubuntu | upstream | * |
Ntp | Ubuntu | vivid/stable-phone-overlay | * |
Ntp | Ubuntu | wily | * |
Ntp | Ubuntu | xenial | * |