CVE-2015-7705
Published: 22 October 2015
The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.
Notes
Author | Note |
---|---|
mdeslaur | fix is bad, see http://lists.ntp.org/pipermail/pool/2015-October/007631.html same fixes as CVE-2015-7704 |
Priority
Status
Package | Release | Status |
---|---|---|
ntp Launchpad, Ubuntu, Debian |
precise |
Released
(1:4.2.6.p3+dfsg-1ubuntu3.6)
|
trusty |
Released
(1:4.2.6.p5+dfsg-3ubuntu2.14.04.5)
|
|
upstream |
Needs triage
|
|
vivid |
Released
(1:4.2.6.p5+dfsg-3ubuntu6.2)
|
|
wily |
Released
(1:4.2.6.p5+dfsg-3ubuntu8.1)
|
|
Patches: upstream: https://github.com/ntp-project/ntp/commit/21d57dc336dbe9a975baca5ce5ae4da5b71ff123 upstream: https://github.com/ntp-project/ntp/commit/492758c3d0690d3ccf7130fabfcf670997f12f7b upstream: https://github.com/ntp-project/ntp/commit/06b143c07c7be5a54608180f69ec06b317e0aac5 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |