5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.86 High
EPSS
Percentile
98.6%
ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the “received” timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 11 | all | ntp | < 1:4.2.8p11+dfsg-1 | ntp_1:4.2.8p11+dfsg-1_all.deb |
Debian | 12 | all | ntpsec | < 1.2.2+dfsg1-1+deb12u1 | ntpsec_1.2.2+dfsg1-1+deb12u1_all.deb |
Debian | 11 | all | ntpsec | < 1.2.0+dfsg1-4 | ntpsec_1.2.0+dfsg1-4_all.deb |
Debian | 999 | all | ntpsec | < 1.2.3+dfsg1-3 | ntpsec_1.2.3+dfsg1-3_all.deb |
Debian | 13 | all | ntpsec | < 1.2.3+dfsg1-3 | ntpsec_1.2.3+dfsg1-3_all.deb |
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.86 High
EPSS
Percentile
98.6%