The nextvar function in NTP before 4.2.8p6 and 4.3.x before 4.3.90 does not
properly validate the length of its input, which allows an attacker to
cause a denial of service (application crash).
Author | Note |
---|---|
mdeslaur | introduced in 4.2.8 by https://github.com/ntp-project/ntp/commit/be565bf3c6a5badd4a6ce2f336476d1e1dd98915 |
support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
www.talosintel.com/reports/TALOS-2016-0072/
launchpad.net/bugs/cve/CVE-2015-7975
nvd.nist.gov/vuln/detail/CVE-2015-7975
security-tracker.debian.org/tracker/CVE-2015-7975
ubuntu.com/security/notices/USN-3096-1
www.cve.org/CVERecord?id=CVE-2015-7975