CVE-2015-7871
07.08.2017, 20:29
Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.Enginsight
Vendor | Product | Version |
---|---|---|
ntp | ntp | 4.2.6 ≤ 𝑥 < 4.2.8 |
ntp | ntp | 4.3.0 ≤ 𝑥 < 4.3.77 |
ntp | ntp | 4.2.5:p186 |
ntp | ntp | 4.2.5:p187 |
ntp | ntp | 4.2.5:p188 |
ntp | ntp | 4.2.5:p189 |
ntp | ntp | 4.2.5:p190 |
ntp | ntp | 4.2.5:p191 |
ntp | ntp | 4.2.5:p192 |
ntp | ntp | 4.2.5:p193 |
ntp | ntp | 4.2.5:p194 |
ntp | ntp | 4.2.5:p195 |
ntp | ntp | 4.2.5:p196 |
ntp | ntp | 4.2.5:p197 |
ntp | ntp | 4.2.5:p198 |
ntp | ntp | 4.2.5:p199 |
ntp | ntp | 4.2.5:p200 |
ntp | ntp | 4.2.5:p201 |
ntp | ntp | 4.2.5:p202 |
ntp | ntp | 4.2.5:p203 |
ntp | ntp | 4.2.5:p204 |
ntp | ntp | 4.2.5:p205 |
ntp | ntp | 4.2.5:p206 |
ntp | ntp | 4.2.5:p207 |
ntp | ntp | 4.2.5:p208 |
ntp | ntp | 4.2.5:p209 |
ntp | ntp | 4.2.5:p210 |
ntp | ntp | 4.2.5:p211 |
ntp | ntp | 4.2.5:p212 |
ntp | ntp | 4.2.5:p213 |
ntp | ntp | 4.2.5:p214 |
ntp | ntp | 4.2.5:p215 |
ntp | ntp | 4.2.5:p216 |
ntp | ntp | 4.2.5:p217 |
ntp | ntp | 4.2.5:p218 |
ntp | ntp | 4.2.5:p219 |
ntp | ntp | 4.2.5:p220 |
ntp | ntp | 4.2.5:p221 |
ntp | ntp | 4.2.5:p222 |
ntp | ntp | 4.2.5:p223 |
ntp | ntp | 4.2.5:p224 |
ntp | ntp | 4.2.5:p225 |
ntp | ntp | 4.2.5:p226 |
ntp | ntp | 4.2.5:p227 |
ntp | ntp | 4.2.5:p228 |
ntp | ntp | 4.2.5:p229 |
ntp | ntp | 4.2.5:p230 |
ntp | ntp | 4.2.5:p231_rc1 |
ntp | ntp | 4.2.5:p232_rc1 |
ntp | ntp | 4.2.5:p233_rc1 |
ntp | ntp | 4.2.5:p234_rc1 |
ntp | ntp | 4.2.5:p235_rc1 |
ntp | ntp | 4.2.5:p236_rc1 |
ntp | ntp | 4.2.5:p237_rc1 |
ntp | ntp | 4.2.5:p238_rc1 |
ntp | ntp | 4.2.5:p239_rc1 |
ntp | ntp | 4.2.5:p240_rc1 |
ntp | ntp | 4.2.5:p241_rc1 |
ntp | ntp | 4.2.5:p242_rc1 |
ntp | ntp | 4.2.5:p243_rc1 |
ntp | ntp | 4.2.5:p244_rc1 |
ntp | ntp | 4.2.5:p245_rc1 |
ntp | ntp | 4.2.5:p246_rc1 |
ntp | ntp | 4.2.5:p247_rc1 |
ntp | ntp | 4.2.5:p248_rc1 |
ntp | ntp | 4.2.5:p249_rc1 |
ntp | ntp | 4.2.5:p250_rc1 |
ntp | ntp | 4.2.8:p1 |
ntp | ntp | 4.2.8:p1-beta1 |
ntp | ntp | 4.2.8:p1-beta2 |
ntp | ntp | 4.2.8:p1-beta3 |
ntp | ntp | 4.2.8:p1-beta4 |
ntp | ntp | 4.2.8:p1-beta5 |
ntp | ntp | 4.2.8:p1-rc1 |
ntp | ntp | 4.2.8:p1-rc2 |
ntp | ntp | 4.2.8:p2 |
ntp | ntp | 4.2.8:p2-rc1 |
ntp | ntp | 4.2.8:p2-rc2 |
ntp | ntp | 4.2.8:p2-rc3 |
ntp | ntp | 4.2.8:p3 |
ntp | ntp | 4.2.8:p3-rc1 |
ntp | ntp | 4.2.8:p3-rc2 |
ntp | ntp | 4.2.8:p3-rc3 |
debian | debian_linux | 7.0 |
debian | debian_linux | 8.0 |
debian | debian_linux | 9.0 |
netapp | oncommand_balance | - |
netapp | oncommand_performance_manager | - |
netapp | oncommand_unified_manager | - |
netapp | clustered_data_ontap | - |
netapp | data_ontap | - |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References