6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.014 Low
EPSS
Percentile
86.3%
The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before
4.2.8p1 on Linux and OS X does not properly determine whether a source IP
address is an IPv6 loopback address, which makes it easier for remote
attackers to spoof restricted packets, and read or write to the runtime
state, by leveraging the ability to reach the ntpd machine’s network
interface with a packet from the ::1 address.
Author | Note |
---|---|
mdeslaur | this used to be known as CVE-2014-9298, patches were released in USN-2497-1 |