CVE-2015-7977

MEDIUM
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

ntpd in NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (NULL pointer dereference) via a ntpdc reslist command.

References

https://www.kb.cert.org/vuls/id/718152

https://security.gentoo.org/glsa/201607-15

https://bto.bluecoat.com/security-advisory/sa113

http://www.ubuntu.com/usn/USN-3096-1

http://www.securitytracker.com/id/1034782

http://www.securityfocus.com/bid/81815

http://www.debian.org/security/2016/dsa-3629

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd

http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security

http://support.ntp.org/bin/view/Main/NtpBug2939

http://rhn.redhat.com/errata/RHSA-2016-2583.html

http://rhn.redhat.com/errata/RHSA-2016-0780.html

http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html

http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html

http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html

http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html

http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html

http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176434.html

http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.html

https://security.netapp.com/advisory/ntap-20171031-0001/

https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc

http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html

https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf

https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11

Details

Source: MITRE

Published: 2017-01-30

Updated: 2021-04-26

Type: CWE-476

Risk Information

CVSS v2

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3

Base Score: 5.9

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 2.2

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:* versions up to 4.2.8 (inclusive)

cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*

Configuration 3

AND

OR

cpe:2.3:o:siemnes:tim_4r-ie_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemnes:tim_4r-ie:*:*:*:*:*:*:*:*

Configuration 4

AND

OR

cpe:2.3:o:siemnes:tim_4r-ie_dnp3_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemnes:tim_4r-ie_dnp3:-:*:*:*:*:*:*:*

Configuration 5

OR

cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*

cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*

Configuration 6

OR

cpe:2.3:o:freebsd:freebsd:9.3:-:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p1:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p10:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p12:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p13:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p16:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p19:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p2:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p20:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p21:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p22:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p23:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p24:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p25:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p28:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p3:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p30:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p31:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p32:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p33:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p34:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p5:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p6:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p7:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p8:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p9:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:-:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p1:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p10:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p12:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p15:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p16:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p17:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p18:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p19:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p2:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p22:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p24:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p25:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p26:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p27:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p3:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p4:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p5:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p6:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p7:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p8:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p9:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.2:-:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.2:p1:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.2:p10:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.2:p2:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.2:p5:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.2:p7:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.2:p8:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.2:p9:*:*:*:*:*:*

Configuration 7

OR

cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*

cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*

Configuration 8

OR

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 9

OR

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

Tenable Plugins

View all (37 total)

IDNameProductFamilySeverity
125008EulerOS Virtualization 3.0.1.0 : ntp (EulerOS-SA-2019-1555)NessusHuawei Local Security Checks
high
106499pfSense < 2.3 Multiple Vulnerabilities (SA-16_01 - SA-16_02)NessusFirewalls
critical
99822EulerOS 2.0 SP1 : ntp (EulerOS-SA-2016-1060)NessusHuawei Local Security Checks
high
96054F5 Networks BIG-IP : NTP vulnerabilities (K06288381)NessusF5 Networks Local Security Checks
high
95850Scientific Linux Security Update : ntp on SL7.x x86_64 (20161103)NessusScientific Linux Local Security Checks
high
95330CentOS 7 : ntp (CESA-2016:2583)NessusCentOS Local Security Checks
high
94705Oracle Linux 7 : ntp (ELSA-2016-2583)NessusOracle Linux Local Security Checks
high
94546RHEL 7 : ntp (RHSA-2016:2583)NessusRed Hat Local Security Checks
high
93896Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS : ntp vulnerabilities (USN-3096-1)NessusUbuntu Local Security Checks
high
93186SUSE SLES10 Security Update : ntp (SUSE-SU-2016:1912-1)NessusSuSE Local Security Checks
critical
92571Debian DSA-3629-1 : ntp - security updateNessusDebian Local Security Checks
high
92546Debian DLA-559-1 : ntp security updateNessusDebian Local Security Checks
high
92485GLSA-201607-15 : NTP: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
92357AIX NTP v4 Advisory : ntp_advisory6.asc (IV83983) (IV83992)NessusAIX Local Security Checks
high
92356AIX NTP v3 Advisory : ntp_advisory6.asc (IV83984) (IV83993) (IV83994) (IV83995) (IV84269)NessusAIX Local Security Checks
high
91539Scientific Linux Security Update : ntp on SL6.x i386/x86_64 (20160510)NessusScientific Linux Local Security Checks
high
91520AIX 5.3 TL 12 : ntp (IV84269) (deprecated)NessusAIX Local Security Checks
high
91519AIX 7.2 TL 0 : ntp (IV83995) (deprecated)NessusAIX Local Security Checks
high
91518AIX 7.1 TL 4 : ntp (IV83994) (deprecated)NessusAIX Local Security Checks
high
91517AIX 7.1 TL 3 : ntp (IV83993) (deprecated)NessusAIX Local Security Checks
high
91516AIX 6.1 TL 9 : ntp (IV83984) (deprecated)NessusAIX Local Security Checks
high
91419OracleVM 3.3 / 3.4 : ntp (OVMSA-2016-0082)NessusOracleVM Local Security Checks
high
91403openSUSE Security Update : ntp (openSUSE-2016-649)NessusSuSE Local Security Checks
critical
91248SUSE SLES11 Security Update : ntp (SUSE-SU-2016:1311-1)NessusSuSE Local Security Checks
critical
91169CentOS 6 : ntp (CESA-2016:0780)NessusCentOS Local Security Checks
high
91151Oracle Linux 6 : ntp (ELSA-2016-0780)NessusOracle Linux Local Security Checks
high
91111openSUSE Security Update : ntp (openSUSE-2016-578)NessusSuSE Local Security Checks
high
91076RHEL 6 : ntp (RHSA-2016:0780)NessusRed Hat Local Security Checks
high
90991SUSE SLED12 / SLES12 Security Update : ntp (SUSE-SU-2016:1247-1)NessusSuSE Local Security Checks
critical
90821SUSE SLED12 / SLES12 Security Update : ntp (SUSE-SU-2016:1177-1)NessusSuSE Local Security Checks
high
90820SUSE SLES11 Security Update : ntp (SUSE-SU-2016:1175-1)NessusSuSE Local Security Checks
high
89577Fedora 23 : ntp-4.2.6p5-36.fc23 (2016-8bb1932088)NessusFedora Local Security Checks
high
89510Fedora 22 : ntp-4.2.6p5-36.fc22 (2016-34bc10a2c8)NessusFedora Local Security Checks
critical
88912Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : ntp (SSA:2016-054-04)NessusSlackware Local Security Checks
high
88661Amazon Linux AMI : ntp (ALAS-2016-649)NessusAmazon Linux Local Security Checks
high
88068FreeBSD : ntp -- multiple vulnerabilities (5237f5d7-c020-11e5-b397-d050996490d0)NessusFreeBSD Local Security Checks
high
88054Network Time Protocol Daemon (ntpd) 3.x / 4.x < 4.2.8p6 Multiple VulnerabilitiesNessusMisc.
medium