ntpd in NTP before 4.2.8p9, when the trap service is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted packet.
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ntp | Ntp | * | 4.2.8 (including) |
Red Hat Enterprise Linux 6 | RedHat | ntp-0:4.2.6p5-10.el6_8.2 | * |
Red Hat Enterprise Linux 7 | RedHat | ntp-0:4.2.6p5-25.el7_3.1 | * |
Ntp | Ubuntu | precise | * |
Ntp | Ubuntu | trusty | * |
Ntp | Ubuntu | upstream | * |
Ntp | Ubuntu | vivid/stable-phone-overlay | * |
Ntp | Ubuntu | xenial | * |
Ntp | Ubuntu | yakkety | * |