NTP before 4.2.8p9 changes the peer structure to the interface it receives the response from a source, which allows remote attackers to cause a denial of service (prevent communication with a source) by sending a response for a source to an interface the source does not use.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Ntp | Ntp | * | 4.2.8 (including) |
| Red Hat Enterprise Linux 6 | RedHat | ntp-0:4.2.6p5-10.el6_8.2 | * |
| Red Hat Enterprise Linux 7 | RedHat | ntp-0:4.2.6p5-25.el7_3.1 | * |
| Ntp | Ubuntu | esm-infra-legacy/trusty | * |
| Ntp | Ubuntu | esm-infra/xenial | * |
| Ntp | Ubuntu | trusty | * |
| Ntp | Ubuntu | trusty/esm | * |
| Ntp | Ubuntu | upstream | * |
| Ntp | Ubuntu | vivid/stable-phone-overlay | * |
| Ntp | Ubuntu | xenial | * |
| Ntp | Ubuntu | yakkety | * |