7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
ntp is vulnerable to denial of service (DoS) attacks. The vulnerability exists as NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.
nwtime.org/ntp428p9_release/
rhn.redhat.com/errata/RHSA-2017-0252.html
support.ntp.org/bin/view/Main/NtpBug3071
support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
www.securityfocus.com/bid/94451
www.securitytracker.com/id/1037354
access.redhat.com/errata/RHSA-2017:0252
access.redhat.com/security/updates/classification/#moderate
bto.bluecoat.com/security-advisory/sa139
h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us
security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc
usn.ubuntu.com/3707-2/
www.kb.cert.org/vuls/id/633847
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P