CVE-2009-3563

EUVD-2009-3544
ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.4 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
Affected Products (NVD)
VendorProductVersion
ntpntp
𝑥
≤ 4.2.2p4
ntpntp
4.0.72
ntpntp
4.0.73
ntpntp
4.0.90
ntpntp
4.0.91
ntpntp
4.0.92
ntpntp
4.0.93
ntpntp
4.0.94
ntpntp
4.0.95
ntpntp
4.0.96
ntpntp
4.0.97
ntpntp
4.0.98
ntpntp
4.0.99
ntpntp
4.1.0
ntpntp
4.1.2
ntpntp
4.2.0
ntpntp
4.2.2
ntpntp
4.2.2p1:p1
ntpntp
4.2.2p2:p2
ntpntp
4.2.2p3:p3
ntpntp
4.2.5
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ntp
bullseye
1:4.2.8p15+dfsg-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ntp
dapper
Fixed 1:4.2.0a+stable-8.1ubuntu6.3
released
hardy
Fixed 1:4.2.4p4+dfsg-3ubuntu2.3
released
intrepid
Fixed 1:4.2.4p4+dfsg-6ubuntu2.4
released
jaunty
Fixed 1:4.2.4p4+dfsg-7ubuntu5.2
released
karmic
Fixed 1:4.2.4p6+dfsg-1ubuntu5.1
released
References