CVE Vulnerabilities

CVE-2016-9311

NULL Pointer Dereference

Published: Jan 13, 2017 | Modified: Jan 24, 2019
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
7.1 HIGH
AV:N/AC:M/Au:N/C:N/I:N/A:C
RedHat/V2
4.3 MODERATE
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V3
5.9 MODERATE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
LOW

ntpd in NTP before 4.2.8p9, when the trap service is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted packet.

Weakness

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Affected Software

Name Vendor Start Version End Version
Ntp Ntp * 4.2.8 (including)
Red Hat Enterprise Linux 6 RedHat ntp-0:4.2.6p5-10.el6_8.2 *
Red Hat Enterprise Linux 7 RedHat ntp-0:4.2.6p5-25.el7_3.1 *
Ntp Ubuntu precise *
Ntp Ubuntu trusty *
Ntp Ubuntu upstream *
Ntp Ubuntu vivid/stable-phone-overlay *
Ntp Ubuntu xenial *
Ntp Ubuntu yakkety *

Potential Mitigations

References