ntpd in NTP before 4.2.8p9, when the trap service is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted packet.
The product dereferences a pointer that it expects to be valid but is NULL.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Ntp | Ntp | * | 4.2.8 (including) |
| Red Hat Enterprise Linux 6 | RedHat | ntp-0:4.2.6p5-10.el6_8.2 | * |
| Red Hat Enterprise Linux 7 | RedHat | ntp-0:4.2.6p5-25.el7_3.1 | * |
| Ntp | Ubuntu | esm-infra-legacy/trusty | * |
| Ntp | Ubuntu | esm-infra/xenial | * |
| Ntp | Ubuntu | precise | * |
| Ntp | Ubuntu | trusty | * |
| Ntp | Ubuntu | trusty/esm | * |
| Ntp | Ubuntu | upstream | * |
| Ntp | Ubuntu | vivid/stable-phone-overlay | * |
| Ntp | Ubuntu | xenial | * |
| Ntp | Ubuntu | yakkety | * |