The getresponse function in ntpq in NTP versions before 4.2.8p9 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (infinite loop) via crafted packets with incorrect values.
http://rhn.redhat.com/errata/RHSA-2016-2583.html
http://support.ntp.org/bin/view/Main/NtpBug2948
http://www.debian.org/security/2016/dsa-3629
http://www.securityfocus.com/bid/81814
http://www.securitytracker.com/id/1034782
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc
https://security.gentoo.org/glsa/201607-15
Source: MITRE
Published: 2017-01-30
Updated: 2018-01-05
Type: NVD-CWE-Other
Base Score: 4.3
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact Score: 2.9
Exploitability Score: 8.6
Severity: MEDIUM
Base Score: 5.9
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Impact Score: 3.6
Exploitability Score: 2.2
Severity: MEDIUM
OR
cpe:2.3:a:ntp:ntp:*:p5:*:*:*:*:*:* versions up to 4.2.8 (inclusive)
cpe:2.3:a:ntp:ntp:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.2:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.3:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.4:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.5:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.6:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.7:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.8:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.10:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.11:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.12:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.13:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.14:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.15:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.16:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.17:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.18:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.19:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.20:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.21:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.22:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.23:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.24:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.25:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.26:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.27:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.28:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.29:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.30:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.31:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.32:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.33:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.34:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.35:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.36:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.37:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.38:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.39:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.40:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.41:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.42:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.43:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.44:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.45:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.46:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.47:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.48:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.49:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.50:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.51:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.52:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.53:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.54:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.55:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.56:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.57:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.58:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.59:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.60:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.61:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.62:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.63:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.64:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.65:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.66:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.67:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.68:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.69:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.70:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.71:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.72:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.73:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.74:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.75:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.76:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.77:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.78:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.79:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.80:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.81:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.82:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.83:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.84:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.85:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.86:*:*:*:*:*:*:*
cpe:2.3:a:ntp:ntp:4.3.87:*:*:*:*:*:*:*
ID | Name | Product | Family | Severity |
---|---|---|---|---|
125008 | EulerOS Virtualization 3.0.1.0 : ntp (EulerOS-SA-2019-1555) | Nessus | Huawei Local Security Checks | high |
106499 | pfSense < 2.3 Multiple Vulnerabilities (SA-16_01 - SA-16_02) | Nessus | Firewalls | critical |
99822 | EulerOS 2.0 SP1 : ntp (EulerOS-SA-2016-1060) | Nessus | Huawei Local Security Checks | medium |
96052 | F5 Networks BIG-IP : NTP vulnerability (K01324833) | Nessus | F5 Networks Local Security Checks | medium |
95850 | Scientific Linux Security Update : ntp on SL7.x x86_64 (20161103) | Nessus | Scientific Linux Local Security Checks | medium |
95330 | CentOS 7 : ntp (CESA-2016:2583) | Nessus | CentOS Local Security Checks | medium |
94705 | Oracle Linux 7 : ntp (ELSA-2016-2583) | Nessus | Oracle Linux Local Security Checks | medium |
94546 | RHEL 7 : ntp (RHSA-2016:2583) | Nessus | Red Hat Local Security Checks | medium |
93896 | Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS : ntp vulnerabilities (USN-3096-1) | Nessus | Ubuntu Local Security Checks | high |
93186 | SUSE SLES10 Security Update : ntp (SUSE-SU-2016:1912-1) | Nessus | SuSE Local Security Checks | high |
92571 | Debian DSA-3629-1 : ntp - security update | Nessus | Debian Local Security Checks | high |
92546 | Debian DLA-559-1 : ntp security update | Nessus | Debian Local Security Checks | high |
92485 | GLSA-201607-15 : NTP: Multiple vulnerabilities | Nessus | Gentoo Local Security Checks | high |
92357 | AIX NTP v4 Advisory : ntp_advisory6.asc (IV83983) (IV83992) | Nessus | AIX Local Security Checks | medium |
92356 | AIX NTP v3 Advisory : ntp_advisory6.asc (IV83984) (IV83993) (IV83994) (IV83995) (IV84269) | Nessus | AIX Local Security Checks | medium |
91520 | AIX 5.3 TL 12 : ntp (IV84269) (deprecated) | Nessus | AIX Local Security Checks | high |
91519 | AIX 7.2 TL 0 : ntp (IV83995) (deprecated) | Nessus | AIX Local Security Checks | high |
91518 | AIX 7.1 TL 4 : ntp (IV83994) (deprecated) | Nessus | AIX Local Security Checks | high |
91517 | AIX 7.1 TL 3 : ntp (IV83993) (deprecated) | Nessus | AIX Local Security Checks | high |
91516 | AIX 6.1 TL 9 : ntp (IV83984) (deprecated) | Nessus | AIX Local Security Checks | high |
91403 | openSUSE Security Update : ntp (openSUSE-2016-649) | Nessus | SuSE Local Security Checks | high |
91248 | SUSE SLES11 Security Update : ntp (SUSE-SU-2016:1311-1) | Nessus | SuSE Local Security Checks | high |
91111 | openSUSE Security Update : ntp (openSUSE-2016-578) | Nessus | SuSE Local Security Checks | medium |
90991 | SUSE SLED12 / SLES12 Security Update : ntp (SUSE-SU-2016:1247-1) | Nessus | SuSE Local Security Checks | high |
90821 | SUSE SLED12 / SLES12 Security Update : ntp (SUSE-SU-2016:1177-1) | Nessus | SuSE Local Security Checks | medium |
90820 | SUSE SLES11 Security Update : ntp (SUSE-SU-2016:1175-1) | Nessus | SuSE Local Security Checks | medium |
89577 | Fedora 23 : ntp-4.2.6p5-36.fc23 (2016-8bb1932088) | Nessus | Fedora Local Security Checks | medium |
89510 | Fedora 22 : ntp-4.2.6p5-36.fc22 (2016-34bc10a2c8) | Nessus | Fedora Local Security Checks | high |
88912 | Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : ntp (SSA:2016-054-04) | Nessus | Slackware Local Security Checks | medium |
88661 | Amazon Linux AMI : ntp (ALAS-2016-649) | Nessus | Amazon Linux Local Security Checks | medium |
88068 | FreeBSD : ntp -- multiple vulnerabilities (5237f5d7-c020-11e5-b397-d050996490d0) | Nessus | FreeBSD Local Security Checks | medium |
88054 | Network Time Protocol Daemon (ntpd) 3.x / 4.x < 4.2.8p6 Multiple Vulnerabilities | Nessus | Misc. | medium |