ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victims clock via a Sybil attack. This issue exists because of an incomplete fix for CVE-2016-1549.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ntp | Ntp | 4.2.0 (including) | 4.2.8 (excluding) |
Ntp | Ntp | 4.3.0 (including) | 4.3.92 (excluding) |
Ntp | Ntp | 4.2.8 (including) | 4.2.8 (including) |
Ntp | Ntp | 4.2.8-p1 (including) | 4.2.8-p1 (including) |
Ntp | Ntp | 4.2.8-p1-beta1 (including) | 4.2.8-p1-beta1 (including) |
Ntp | Ntp | 4.2.8-p1-beta2 (including) | 4.2.8-p1-beta2 (including) |
Ntp | Ntp | 4.2.8-p1-beta3 (including) | 4.2.8-p1-beta3 (including) |
Ntp | Ntp | 4.2.8-p1-beta4 (including) | 4.2.8-p1-beta4 (including) |
Ntp | Ntp | 4.2.8-p1-beta5 (including) | 4.2.8-p1-beta5 (including) |
Ntp | Ntp | 4.2.8-p1-rc1 (including) | 4.2.8-p1-rc1 (including) |
Ntp | Ntp | 4.2.8-p1-rc2 (including) | 4.2.8-p1-rc2 (including) |
Ntp | Ntp | 4.2.8-p2 (including) | 4.2.8-p2 (including) |
Ntp | Ntp | 4.2.8-p2-rc1 (including) | 4.2.8-p2-rc1 (including) |
Ntp | Ntp | 4.2.8-p2-rc2 (including) | 4.2.8-p2-rc2 (including) |
Ntp | Ntp | 4.2.8-p2-rc3 (including) | 4.2.8-p2-rc3 (including) |
Ntp | Ntp | 4.2.8-p3 (including) | 4.2.8-p3 (including) |
Ntp | Ntp | 4.2.8-p3-rc1 (including) | 4.2.8-p3-rc1 (including) |
Ntp | Ntp | 4.2.8-p3-rc2 (including) | 4.2.8-p3-rc2 (including) |
Ntp | Ntp | 4.2.8-p3-rc3 (including) | 4.2.8-p3-rc3 (including) |
Ntp | Ntp | 4.2.8-p4 (including) | 4.2.8-p4 (including) |
Ntp | Ntp | 4.2.8-p5 (including) | 4.2.8-p5 (including) |
Ntp | Ntp | 4.2.8-p6 (including) | 4.2.8-p6 (including) |