Lucene search

K
f5F5F5:K64505405
HistoryJun 16, 2016 - 12:00 a.m.

K64505405 : NTP vulnerability CVE-2016-4956

2016-06-1600:00:00
my.f5.com
13

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L

6.5 Medium

AI Score

Confidence

High

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

0.018 Low

EPSS

Percentile

86.7%

Security Advisory Description

ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (interleaved-mode transition and time change) via a spoofed broadcast packet. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-1548. (CVE-2016-4956)

Impact

In default configurations, F5 products are not vulnerable to this issue.

BIG-IP, Enterprise Manager, and BIG-IQ

This vulnerability can be exposed only if the ntp.conf file is manually edited to enable**broadcastclient **mode in the network time protocol (NTP).

Traffix SDC

This vulnerability may be exposed if the vulnerability is implemented in a closed client network where Traffix SDC is running with an NTP client configuration.

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L

6.5 Medium

AI Score

Confidence

High

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

0.018 Low

EPSS

Percentile

86.7%