ntpd in ntp 4.2.8 before 4.2.8p15 and 4.3.x before 4.3.101 allows remote attackers to cause a denial of service (memory consumption) by sending packets, because memory is not freed in situations where a CMAC key is used and associated with a CMAC algorithm in the ntp.keys file.
The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ntp | Ntp | 4.3.97 (including) | 4.3.101 (excluding) |
Ntp | Ntp | 4.2.8-p11 (including) | 4.2.8-p11 (including) |
Ntp | Ntp | 4.2.8-p12 (including) | 4.2.8-p12 (including) |
Ntp | Ntp | 4.2.8-p13 (including) | 4.2.8-p13 (including) |
Ntp | Ntp | 4.2.8-p14 (including) | 4.2.8-p14 (including) |
Ntp | Ubuntu | eoan | * |
Ntp | Ubuntu | esm-apps/focal | * |
Ntp | Ubuntu | focal | * |
Ntp | Ubuntu | groovy | * |
Ntp | Ubuntu | hirsute | * |
Ntp | Ubuntu | impish | * |
Ntp | Ubuntu | trusty | * |
Ntpsec | Ubuntu | trusty | * |