Lucene search

K
f5F5F5:K80996302
HistoryDec 16, 2016 - 12:00 a.m.

K80996302 : Multiple NTP vulnerabilities

2016-12-1600:00:00
my.f5.com
44

6.4 Medium

AI Score

Confidence

Low

0.63 Medium

EPSS

Percentile

97.9%

Security Advisory Description

The broadcast mode replay prevention functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (reject broadcast mode packets) via a crafted broadcast mode packet.

ntpd in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (reject broadcast mode packets) via the poll interval in a broadcast packet.

NTP before 4.2.8p9 changes the peer structure to the interface it receives the response from a source, which allows remote attackers to cause a denial of service (prevent communication with a source) by sending a response for a source to an interface the source does not use.

NTP before 4.2.8p9 allows remote attackers to bypass the origin timestamp protection mechanism via an origin timestamp of zero. NOTE: this vulnerability exists because of a CVE-2015-8138 regression.

NTP before 4.2.8p9 does not properly perform the initial sync calculations, which allows remote attackers to unspecified impact via unknown vectors, related to a “root distance that did not include the peer dispersion.”

ntpd in NTP before 4.2.8p9, when running on Windows, allows remote attackers to cause a denial of service via a large UDP packet.
Impact
There is no impact; F5 products are not affected by this vulnerability.