CVE-2015-7848
06.01.2017, 21:59
An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash.Enginsight
Vendor | Product | Version |
---|---|---|
netapp | clustered_data_ontap | - |
netapp | data_ontap_operating_in_7-mode | - |
netapp | oncommand_balance | - |
netapp | oncommand_performance_manager | - |
netapp | oncommand_unified_manager | - |
ntp | ntp | 4.0 ≤ 𝑥 < 4.2.8 |
ntp | ntp | 4.3.0 ≤ 𝑥 < 4.3.77 |
ntp | ntp | 4.2.8 |
ntp | ntp | 4.2.8:p1 |
ntp | ntp | 4.2.8:p1-beta1 |
ntp | ntp | 4.2.8:p1-beta2 |
ntp | ntp | 4.2.8:p1-beta3 |
ntp | ntp | 4.2.8:p1-beta4 |
ntp | ntp | 4.2.8:p1-beta5 |
ntp | ntp | 4.2.8:p1-rc1 |
ntp | ntp | 4.2.8:p1-rc2 |
ntp | ntp | 4.2.8:p2 |
ntp | ntp | 4.2.8:p2-rc1 |
ntp | ntp | 4.2.8:p2-rc2 |
ntp | ntp | 4.2.8:p2-rc3 |
ntp | ntp | 4.2.8:p3 |
ntp | ntp | 4.2.8:p3-rc1 |
ntp | ntp | 4.2.8:p3-rc2 |
ntp | ntp | 4.2.8:p3-rc3 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
References