CVE-2016-2518

The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 75%
VendorProductVersion
ntpntp
𝑥
< 4.2.8
ntpntp
4.3.0 ≤
𝑥
< 4.3.92
ntpntp
4.2.8
ntpntp
4.2.8:p1
ntpntp
4.2.8:p1-beta1
ntpntp
4.2.8:p1-beta2
ntpntp
4.2.8:p1-beta3
ntpntp
4.2.8:p1-beta4
ntpntp
4.2.8:p1-beta5
ntpntp
4.2.8:p1-rc1
ntpntp
4.2.8:p1-rc2
ntpntp
4.2.8:p2
ntpntp
4.2.8:p2-rc1
ntpntp
4.2.8:p2-rc2
ntpntp
4.2.8:p2-rc3
ntpntp
4.2.8:p3
ntpntp
4.2.8:p3-rc1
ntpntp
4.2.8:p3-rc2
ntpntp
4.2.8:p3-rc3
ntpntp
4.2.8:p4
ntpntp
4.2.8:p5
ntpntp
4.2.8:p6
ntpntp
4.2.8:p7
ntpntp
4.2.8:p8
debiandebian_linux
8.0
debiandebian_linux
9.0
debiandebian_linux
10.0
netappclustered_data_ontap
-
netappdata_ontap
-
netapponcommand_balance
-
netapponcommand_performance_manager
-
netapponcommand_unified_manager_for_clustered_data_ontap
-
oraclecommunications_user_data_repository
10.0.0
oraclecommunications_user_data_repository
10.0.1
oraclecommunications_user_data_repository
12.0.0
redhatenterprise_linux_desktop
7.0
redhatenterprise_linux_server
6.0
redhatenterprise_linux_server
7.0
redhatenterprise_linux_server_aus
7.2
redhatenterprise_linux_server_aus
7.4
redhatenterprise_linux_server_aus
7.6
redhatenterprise_linux_server_eus
7.2
redhatenterprise_linux_server_eus
7.3
redhatenterprise_linux_server_eus
7.4
redhatenterprise_linux_server_eus
7.5
redhatenterprise_linux_server_eus
7.6
redhatenterprise_linux_server_eus
7.7
redhatenterprise_linux_server_tus
7.2
redhatenterprise_linux_server_tus
7.3
redhatenterprise_linux_server_tus
7.6
redhatenterprise_linux_server_tus
7.7
redhatenterprise_linux_workstation
6.0
freebsdfreebsd
9.3
freebsdfreebsd
9.3:p1
freebsdfreebsd
9.3:p10
freebsdfreebsd
9.3:p12
freebsdfreebsd
9.3:p13
freebsdfreebsd
9.3:p16
freebsdfreebsd
9.3:p19
freebsdfreebsd
9.3:p2
freebsdfreebsd
9.3:p20
freebsdfreebsd
9.3:p21
freebsdfreebsd
9.3:p22
freebsdfreebsd
9.3:p23
freebsdfreebsd
9.3:p24
freebsdfreebsd
9.3:p25
freebsdfreebsd
9.3:p28
freebsdfreebsd
9.3:p3
freebsdfreebsd
9.3:p30
freebsdfreebsd
9.3:p31
freebsdfreebsd
9.3:p32
freebsdfreebsd
9.3:p33
freebsdfreebsd
9.3:p34
freebsdfreebsd
9.3:p35
freebsdfreebsd
9.3:p36
freebsdfreebsd
9.3:p38
freebsdfreebsd
9.3:p39
freebsdfreebsd
9.3:p5
freebsdfreebsd
9.3:p6
freebsdfreebsd
9.3:p7
freebsdfreebsd
9.3:p8
freebsdfreebsd
9.3:p9
freebsdfreebsd
10.1
freebsdfreebsd
10.1:p1
freebsdfreebsd
10.1:p10
freebsdfreebsd
10.1:p12
freebsdfreebsd
10.1:p15
freebsdfreebsd
10.1:p16
freebsdfreebsd
10.1:p17
freebsdfreebsd
10.1:p18
freebsdfreebsd
10.1:p19
freebsdfreebsd
10.1:p2
freebsdfreebsd
10.1:p22
freebsdfreebsd
10.1:p24
freebsdfreebsd
10.1:p25
freebsdfreebsd
10.1:p26
freebsdfreebsd
10.1:p27
freebsdfreebsd
10.1:p28
freebsdfreebsd
10.1:p29
freebsdfreebsd
10.1:p3
freebsdfreebsd
10.1:p30
freebsdfreebsd
10.1:p31
freebsdfreebsd
10.1:p4
freebsdfreebsd
10.1:p5
freebsdfreebsd
10.1:p6
freebsdfreebsd
10.1:p7
freebsdfreebsd
10.1:p8
freebsdfreebsd
10.1:p9
freebsdfreebsd
10.2
freebsdfreebsd
10.2:p1
freebsdfreebsd
10.2:p10
freebsdfreebsd
10.2:p11
freebsdfreebsd
10.2:p12
freebsdfreebsd
10.2:p13
freebsdfreebsd
10.2:p14
freebsdfreebsd
10.2:p2
freebsdfreebsd
10.2:p5
freebsdfreebsd
10.2:p7
freebsdfreebsd
10.2:p8
freebsdfreebsd
10.2:p9
freebsdfreebsd
10.3
siemenssimatic_net_cp_443-1_opc_ua_firmware
*
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ntp
bullseye
1:4.2.8p15+dfsg-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ntp
zesty
not-affected
yakkety
not-affected
xenial
Fixed 1:4.2.8p4+dfsg-3ubuntu5.3
released
wily
ignored
trusty
Fixed 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10
released
precise
Fixed 1:4.2.6.p3+dfsg-1ubuntu3.11
released
References