CVE-2016-7426
13.01.2017, 16:59
NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.Enginsight
Vendor | Product | Version |
---|---|---|
ntp | ntp | 4.2.6 ≤ 𝑥 < 4.2.8 |
ntp | ntp | 4.3.0 ≤ 𝑥 < 4.3.94 |
ntp | ntp | 4.2.5:p203 |
ntp | ntp | 4.2.5:p204 |
ntp | ntp | 4.2.5:p205 |
ntp | ntp | 4.2.5:p206 |
ntp | ntp | 4.2.5:p207 |
ntp | ntp | 4.2.5:p208 |
ntp | ntp | 4.2.5:p209 |
ntp | ntp | 4.2.5:p210 |
ntp | ntp | 4.2.5:p211 |
ntp | ntp | 4.2.5:p212 |
ntp | ntp | 4.2.5:p213 |
ntp | ntp | 4.2.5:p214 |
ntp | ntp | 4.2.5:p215 |
ntp | ntp | 4.2.5:p216 |
ntp | ntp | 4.2.5:p217 |
ntp | ntp | 4.2.5:p218 |
ntp | ntp | 4.2.5:p219 |
ntp | ntp | 4.2.5:p220 |
ntp | ntp | 4.2.5:p221 |
ntp | ntp | 4.2.5:p222 |
ntp | ntp | 4.2.5:p223 |
ntp | ntp | 4.2.5:p224 |
ntp | ntp | 4.2.5:p225 |
ntp | ntp | 4.2.5:p226 |
ntp | ntp | 4.2.5:p227 |
ntp | ntp | 4.2.5:p228 |
ntp | ntp | 4.2.5:p229 |
ntp | ntp | 4.2.5:p230 |
ntp | ntp | 4.2.5:p231_rc1 |
ntp | ntp | 4.2.5:p232_rc1 |
ntp | ntp | 4.2.5:p233_rc1 |
ntp | ntp | 4.2.5:p234_rc1 |
ntp | ntp | 4.2.5:p235_rc1 |
ntp | ntp | 4.2.5:p236_rc1 |
ntp | ntp | 4.2.5:p237_rc1 |
ntp | ntp | 4.2.5:p238_rc1 |
ntp | ntp | 4.2.5:p239_rc1 |
ntp | ntp | 4.2.5:p240_rc1 |
ntp | ntp | 4.2.5:p241_rc1 |
ntp | ntp | 4.2.5:p242_rc1 |
ntp | ntp | 4.2.5:p243_rc1 |
ntp | ntp | 4.2.5:p244_rc1 |
ntp | ntp | 4.2.5:p245_rc1 |
ntp | ntp | 4.2.5:p246_rc1 |
ntp | ntp | 4.2.5:p247_rc1 |
ntp | ntp | 4.2.5:p248_rc1 |
ntp | ntp | 4.2.5:p249_rc1 |
ntp | ntp | 4.2.5:p250_rc1 |
ntp | ntp | 4.2.8 |
ntp | ntp | 4.2.8:p1 |
ntp | ntp | 4.2.8:p1-beta1 |
ntp | ntp | 4.2.8:p1-beta2 |
ntp | ntp | 4.2.8:p1-beta3 |
ntp | ntp | 4.2.8:p1-beta4 |
ntp | ntp | 4.2.8:p1-beta5 |
ntp | ntp | 4.2.8:p1-rc1 |
ntp | ntp | 4.2.8:p1-rc2 |
ntp | ntp | 4.2.8:p2 |
ntp | ntp | 4.2.8:p2-rc1 |
ntp | ntp | 4.2.8:p2-rc2 |
ntp | ntp | 4.2.8:p2-rc3 |
ntp | ntp | 4.2.8:p3 |
ntp | ntp | 4.2.8:p3-rc1 |
ntp | ntp | 4.2.8:p3-rc2 |
ntp | ntp | 4.2.8:p3-rc3 |
ntp | ntp | 4.2.8:p4 |
ntp | ntp | 4.2.8:p5 |
ntp | ntp | 4.2.8:p6 |
ntp | ntp | 4.2.8:p7 |
ntp | ntp | 4.2.8:p8 |
canonical | ubuntu_linux | 12.04 |
redhat | enterprise_linux_desktop | 6.0 |
redhat | enterprise_linux_desktop | 7.0 |
redhat | enterprise_linux_server | 6.0 |
redhat | enterprise_linux_server | 7.0 |
redhat | enterprise_linux_server_aus | 7.3 |
redhat | enterprise_linux_server_aus | 7.4 |
redhat | enterprise_linux_server_aus | 7.6 |
redhat | enterprise_linux_server_aus | 7.7 |
redhat | enterprise_linux_server_eus | 7.3 |
redhat | enterprise_linux_server_eus | 7.4 |
redhat | enterprise_linux_server_eus | 7.5 |
redhat | enterprise_linux_server_eus | 7.6 |
redhat | enterprise_linux_server_eus | 7.7 |
redhat | enterprise_linux_server_tus | 7.3 |
redhat | enterprise_linux_server_tus | 7.6 |
redhat | enterprise_linux_server_tus | 7.7 |
redhat | enterprise_linux_workstation | 6.0 |
redhat | enterprise_linux_workstation | 7.0 |
𝑥
= Vulnerable software versions

Ubuntu Releases
References