CVE Vulnerabilities

CVE-2016-9311

NULL Pointer Dereference

Published: Jan 13, 2017 | Modified: Apr 20, 2025
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
7.1 HIGH
AV:N/AC:M/Au:N/C:N/I:N/A:C
RedHat/V2
4.3 MODERATE
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V3
5.9 MODERATE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

ntpd in NTP before 4.2.8p9, when the trap service is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted packet.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
NtpNtp*4.2.8 (including)
Red Hat Enterprise Linux 6RedHatntp-0:4.2.6p5-10.el6_8.2*
Red Hat Enterprise Linux 7RedHatntp-0:4.2.6p5-25.el7_3.1*
NtpUbuntuesm-infra-legacy/trusty*
NtpUbuntuesm-infra/xenial*
NtpUbuntuprecise*
NtpUbuntutrusty*
NtpUbuntutrusty/esm*
NtpUbuntuupstream*
NtpUbuntuvivid/stable-phone-overlay*
NtpUbuntuxenial*
NtpUbuntuyakkety*

Potential Mitigations

References