CVE-2015-7977

MEDIUM

Description

ntpd in NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (NULL pointer dereference) via a ntpdc reslist command.

References

https://www.kb.cert.org/vuls/id/718152

https://security.gentoo.org/glsa/201607-15

https://bto.bluecoat.com/security-advisory/sa113

http://www.ubuntu.com/usn/USN-3096-1

http://www.securitytracker.com/id/1034782

http://www.securityfocus.com/bid/81815

http://www.debian.org/security/2016/dsa-3629

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd

http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security

http://support.ntp.org/bin/view/Main/NtpBug2939

http://rhn.redhat.com/errata/RHSA-2016-2583.html

http://rhn.redhat.com/errata/RHSA-2016-0780.html

http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html

http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html

http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html

http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html

http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html

http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176434.html

http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.html

https://security.netapp.com/advisory/ntap-20171031-0001/

https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc

http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html

https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf

https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11

Details

Source: MITRE

Published: 2017-01-30

Updated: 2021-04-26

Type: CWE-476

Risk Information

CVSS v2.0

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3.0

Base Score: 5.9

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 2.2

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:* versions up to 4.2.8 (inclusive)

cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*

Configuration 3

AND

OR

cpe:2.3:o:siemnes:tim_4r-ie_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemnes:tim_4r-ie:*:*:*:*:*:*:*:*

Configuration 4

AND

OR

cpe:2.3:o:siemnes:tim_4r-ie_dnp3_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemnes:tim_4r-ie_dnp3:-:*:*:*:*:*:*:*

Configuration 5

OR

cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*

cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*

Configuration 6

OR

cpe:2.3:o:freebsd:freebsd:9.3:-:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p1:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p10:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p12:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p13:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p16:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p19:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p2:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p20:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p21:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p22:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p23:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p24:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p25:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p28:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p3:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p30:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p31:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p32:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p33:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p34:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p5:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p6:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p7:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p8:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:9.3:p9:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:-:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p1:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p10:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p12:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p15:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p16:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p17:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p18:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p19:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p2:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p22:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p24:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p25:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p26:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p27:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p3:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p4:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p5:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p6:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p7:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p8:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.1:p9:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.2:-:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.2:p1:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.2:p10:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.2:p2:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.2:p5:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.2:p7:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.2:p8:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:10.2:p9:*:*:*:*:*:*

Configuration 7

OR

cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*

cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*

Configuration 8

OR

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 9

OR

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

Tenable Plugins

View all (37 total)

IDNameProductFamilySeverity
125008EulerOS Virtualization 3.0.1.0 : ntp (EulerOS-SA-2019-1555)NessusHuawei Local Security Checks
high
106499pfSense < 2.3 Multiple Vulnerabilities (SA-16_01 - SA-16_02)NessusFirewalls
critical
99822EulerOS 2.0 SP1 : ntp (EulerOS-SA-2016-1060)NessusHuawei Local Security Checks
medium
96054F5 Networks BIG-IP : NTP vulnerabilities (K06288381)NessusF5 Networks Local Security Checks
medium
95850Scientific Linux Security Update : ntp on SL7.x x86_64 (20161103)NessusScientific Linux Local Security Checks
medium
95330CentOS 7 : ntp (CESA-2016:2583)NessusCentOS Local Security Checks
medium
94705Oracle Linux 7 : ntp (ELSA-2016-2583)NessusOracle Linux Local Security Checks
medium
94546RHEL 7 : ntp (RHSA-2016:2583)NessusRed Hat Local Security Checks
medium
93896Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS : ntp vulnerabilities (USN-3096-1)NessusUbuntu Local Security Checks
high
93186SUSE SLES10 Security Update : ntp (SUSE-SU-2016:1912-1)NessusSuSE Local Security Checks
high
92571Debian DSA-3629-1 : ntp - security updateNessusDebian Local Security Checks
high
92546Debian DLA-559-1 : ntp security updateNessusDebian Local Security Checks
high
92485GLSA-201607-15 : NTP: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
92357AIX NTP v4 Advisory : ntp_advisory6.asc (IV83983) (IV83992)NessusAIX Local Security Checks
medium
92356AIX NTP v3 Advisory : ntp_advisory6.asc (IV83984) (IV83993) (IV83994) (IV83995) (IV84269)NessusAIX Local Security Checks
medium
91539Scientific Linux Security Update : ntp on SL6.x i386/x86_64 (20160510)NessusScientific Linux Local Security Checks
medium
91520AIX 5.3 TL 12 : ntp (IV84269) (deprecated)NessusAIX Local Security Checks
high
91519AIX 7.2 TL 0 : ntp (IV83995) (deprecated)NessusAIX Local Security Checks
high
91518AIX 7.1 TL 4 : ntp (IV83994) (deprecated)NessusAIX Local Security Checks
high
91517AIX 7.1 TL 3 : ntp (IV83993) (deprecated)NessusAIX Local Security Checks
high
91516AIX 6.1 TL 9 : ntp (IV83984) (deprecated)NessusAIX Local Security Checks
high
91419OracleVM 3.3 / 3.4 : ntp (OVMSA-2016-0082)NessusOracleVM Local Security Checks
medium
91403openSUSE Security Update : ntp (openSUSE-2016-649)NessusSuSE Local Security Checks
high
91248SUSE SLES11 Security Update : ntp (SUSE-SU-2016:1311-1)NessusSuSE Local Security Checks
high
91169CentOS 6 : ntp (CESA-2016:0780)NessusCentOS Local Security Checks
medium
91151Oracle Linux 6 : ntp (ELSA-2016-0780)NessusOracle Linux Local Security Checks
medium
91111openSUSE Security Update : ntp (openSUSE-2016-578)NessusSuSE Local Security Checks
medium
91076RHEL 6 : ntp (RHSA-2016:0780)NessusRed Hat Local Security Checks
medium
90991SUSE SLED12 / SLES12 Security Update : ntp (SUSE-SU-2016:1247-1)NessusSuSE Local Security Checks
high
90821SUSE SLED12 / SLES12 Security Update : ntp (SUSE-SU-2016:1177-1)NessusSuSE Local Security Checks
medium
90820SUSE SLES11 Security Update : ntp (SUSE-SU-2016:1175-1)NessusSuSE Local Security Checks
medium
89577Fedora 23 : ntp-4.2.6p5-36.fc23 (2016-8bb1932088)NessusFedora Local Security Checks
medium
89510Fedora 22 : ntp-4.2.6p5-36.fc22 (2016-34bc10a2c8)NessusFedora Local Security Checks
high
88912Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : ntp (SSA:2016-054-04)NessusSlackware Local Security Checks
medium
88661Amazon Linux AMI : ntp (ALAS-2016-649)NessusAmazon Linux Local Security Checks
medium
88068FreeBSD : ntp -- multiple vulnerabilities (5237f5d7-c020-11e5-b397-d050996490d0)NessusFreeBSD Local Security Checks
medium
88054Network Time Protocol Daemon (ntpd) 3.x / 4.x < 4.2.8p6 Multiple VulnerabilitiesNessusMisc.
medium