Lucene search

K
HpeHpux-ntp

7 matches found

CVE
CVE
added 2019/05/15 4:29 p.m.356 views

CVE-2019-8936

NTP through 4.2.8p12 has a NULL Pointer Dereference.

7.5CVSS7.4AI score0.08689EPSS
CVE
CVE
added 2017/03/27 5:59 p.m.320 views

CVE-2017-6458

Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.

8.8CVSS8.5AI score0.04936EPSS
CVE
CVE
added 2018/03/06 8:29 p.m.187 views

CVE-2018-7185

The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association.

7.5CVSS7.2AI score0.11185EPSS
CVE
CVE
added 2018/03/06 8:29 p.m.172 views

CVE-2018-7170

ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sybil attack. This issue exists because of an incom...

5.3CVSS6.3AI score0.02063EPSS
CVE
CVE
added 2017/01/13 4:59 p.m.121 views

CVE-2016-7426

NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.

7.5CVSS6.4AI score0.472EPSS
CVE
CVE
added 2017/01/13 4:59 p.m.110 views

CVE-2016-7434

The read_mru_list function in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (crash) via a crafted mrulist query.

7.5CVSS6.1AI score0.71728EPSS
CVE
CVE
added 2018/06/04 8:29 p.m.100 views

CVE-2016-9042

An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin time...

5.9CVSS6.6AI score0.02529EPSS