ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the received timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ntp | Ntp | 4.2.8-p10 (including) | 4.2.8-p10 (including) |
Ntp | Ntp | 4.2.8-p4 (including) | 4.2.8-p4 (including) |
Ntp | Ntp | 4.2.8-p5 (including) | 4.2.8-p5 (including) |
Ntp | Ntp | 4.2.8-p6 (including) | 4.2.8-p6 (including) |
Ntp | Ntp | 4.2.8-p7 (including) | 4.2.8-p7 (including) |
Ntp | Ntp | 4.2.8-p8 (including) | 4.2.8-p8 (including) |
Ntp | Ntp | 4.2.8-p9 (including) | 4.2.8-p9 (including) |
Ntp | Ubuntu | artful | * |
Ntp | Ubuntu | bionic | * |
Ntp | Ubuntu | devel | * |
Ntp | Ubuntu | upstream | * |