Lucene search

K
ubuntucveUbuntu.comUB:CVE-2014-9751
HistoryOct 06, 2015 - 12:00 a.m.

CVE-2014-9751

2015-10-0600:00:00
ubuntu.com
ubuntu.com
16

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.014 Low

EPSS

Percentile

86.3%

The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before
4.2.8p1 on Linux and OS X does not properly determine whether a source IP
address is an IPv6 loopback address, which makes it easier for remote
attackers to spoof restricted packets, and read or write to the runtime
state, by leveraging the ability to reach the ntpd machine’s network
interface with a packet from the ::1 address.

Bugs

Notes

Author Note
mdeslaur this used to be known as CVE-2014-9298, patches were released in USN-2497-1

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.014 Low

EPSS

Percentile

86.3%