This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
It was discovered that ntpd as a client did not correctly check the
originate timestamp in received packets. A remote attacker could use
this flaw to send a crafted packet to an ntpd client that would
effectively disable synchronization with the server, or push arbitrary
offset/delay measurements to modify the time on the client.
After installing the update, the ntpd daemon will restart
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 5.0