CVE-2020-11868
17.04.2020, 04:15
ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a valid origin timestamp.Enginsight
Vendor | Product | Version |
---|---|---|
ntp | ntp | 𝑥 ≤ 4.2.7 |
ntp | ntp | 4.3.98 ≤ 𝑥 < 4.3.100 |
ntp | ntp | 4.2.8 |
ntp | ntp | 4.2.8:p1 |
ntp | ntp | 4.2.8:p1-beta1 |
ntp | ntp | 4.2.8:p1-beta2 |
ntp | ntp | 4.2.8:p1-beta3 |
ntp | ntp | 4.2.8:p1-beta4 |
ntp | ntp | 4.2.8:p1-beta5 |
ntp | ntp | 4.2.8:p1-rc1 |
ntp | ntp | 4.2.8:p1-rc2 |
ntp | ntp | 4.2.8:p10 |
ntp | ntp | 4.2.8:p11 |
ntp | ntp | 4.2.8:p12 |
ntp | ntp | 4.2.8:p13 |
ntp | ntp | 4.2.8:p2 |
ntp | ntp | 4.2.8:p2-rc1 |
ntp | ntp | 4.2.8:p2-rc2 |
ntp | ntp | 4.2.8:p2-rc3 |
ntp | ntp | 4.2.8:p3 |
ntp | ntp | 4.2.8:p3-rc1 |
ntp | ntp | 4.2.8:p3-rc2 |
ntp | ntp | 4.2.8:p3-rc3 |
ntp | ntp | 4.2.8:p4 |
ntp | ntp | 4.2.8:p5 |
ntp | ntp | 4.2.8:p6 |
ntp | ntp | 4.2.8:p7 |
ntp | ntp | 4.2.8:p8 |
ntp | ntp | 4.2.8:p9 |
redhat | enterprise_linux | 7.0 |
netapp | data_ontap | - |
netapp | hci_management_node | - |
netapp | solidfire | - |
netapp | vasa_provider_for_clustered_data_ontap | 7.2 ≤ |
netapp | vasa_provider_for_clustered_data_ontap | 7.2 ≤ |
netapp | virtual_storage_console | 7.2 ≤ |
netapp | clustered_data_ontap | - |
netapp | hci_storage_node_firmware | - |
netapp | fabric-attached_storage_8300_firmware | - |
netapp | fabric-attached_storage_8700_firmware | - |
netapp | fabric-attached_storage_a400_firmware | - |
netapp | all_flash_fabric-attached_storage_8300_firmware | - |
netapp | all_flash_fabric-attached_storage_8700_firmware | - |
netapp | all_flash_fabric-attached_storage_a400_firmware | - |
debian | debian_linux | 8.0 |
opensuse | leap | 15.1 |
opensuse | leap | 15.2 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
ntp |
| ||||||||||||||||||||||||||
ntpsec |
|
Common Weakness Enumeration
References