CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:P/I:P/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
85.3%
Vulnerability in the ptp4l service of the LinuxPTP precision time protocol (PTP) implementation software
is caused by an operation exceeding buffer boundaries in memory. Exploitation of the vulnerability could allow an attacker,
acting remotely, cause the application to crash as a result of creating a one-step
synchronization message
Vulnerability in the ptp4l service of the LinuxPTP precision time protocol (PTP) implementation software
is related to insufficient verification of the length of forwarded messages. Exploitation of the vulnerability could allow
an attacker acting remotely to gain unauthorized access to protected information, cause a denial of service, or execute arbitrary actions.
denial of service or execute arbitrary code
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:P/I:P/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
85.3%